-
1
-
-
34547399387
-
Amultifaceted approach to understanding the botnet phenomenon
-
Abu Rajab, M., Zarfoss, J., Monrose, F., et al., 2006. Amultifaceted approach to understanding the botnet phenomenon. Proc. 6th ACM SIGCOMM Conf. on Internet Measurement, p.41–52.
-
(2006)
Proc. 6th ACM SIGCOMM Conf. on Internet Measuremen
, pp. 41-52
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
-
2
-
-
85006595081
-
Efficient generalized forensics framework for extraction and documentation of evidence from mobile devices
-
Ahmed, R., Dharaskar, R.V., Thakare, V.M., 2013. Efficient generalized forensics framework for extraction and documentation of evidence from mobile devices. Int. J. Enhanced Res. Manag. Comput. Appl., 2(1):1–7.
-
(2013)
Int. J. Enhanced Res. Manag. Comput. Appl
, vol.2
, Issue.1
, pp. 1-7
-
-
Ahmed, R.1
Dharaskar, R.V.2
Thakare, V.M.3
-
3
-
-
85084161642
-
Challenges in experimenting with botnet detection systems
-
Aviv, A.J., Haeberlen, A., 2011. Challenges in experimenting with botnet detection systems. USENIX 4th CSET Workshop, p.1–8.
-
(2011)
USENIX 4th CSET Worksho
, pp. 1-8
-
-
Aviv, A.J.1
Haeberlen, A.2
-
4
-
-
66249147541
-
A survey of botnet technology and defenses
-
Bailey, M., Cooke, E., Jahanian, F., et al., 2009. A survey of botnet technology and defenses. IEEE Cybersecurity Applications & Technology Conf. for Homeland Security, p.299–304. [doi:10.1109/CATCH.2009.40]
-
(2009)
IEEE Cybersecurity Applications & Technology Conf. for Homeland Securit
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
-
5
-
-
84882582017
-
An inside look at botnets
-
Barford, P., Yegneswaran, V., 2007. An inside look at botnets. In: Malware Detection. Springer, p.171–191. [doi:10.1007/978-0-387-44599-1_8]
-
(2007)
Malware Detectio
, pp. 171-191
-
-
Barford, P.1
Yegneswaran, V.2
-
7
-
-
78651387720
-
ITU Study on the Financial Aspects of Network Security: Malware and Spam
-
Bauer, J., van Eeten, M., Chattopadhyay, T., 2008. ITU Study on the Financial Aspects of Network Security: Malware and Spam. Final Report, ICT Applications and Cybersecurity Division, International Telecommunication Union.
-
(2008)
Final Report, ICT Applications and Cybersecurity Division, International Telecommunication Unio
-
-
Bauer, J.1
van Eeten, M.2
Chattopadhyay, T.3
-
9
-
-
85058835823
-
Mapping Internet sensors with probe response attacks
-
Bethencourt, J., Franklin, J., Vernon, M., 2005. Mapping Internet sensors with probe response attacks. Proc. 14th USENIX Security Symp., p.193–208.
-
(2005)
Proc. 14th USENIX Security Symp
, pp. 193-208
-
-
Bethencourt, J.1
Franklin, J.2
Vernon, M.3
-
10
-
-
84894646147
-
Network anomaly detection: methods, systems and tools
-
Bhuyan, M., Bhattacharyya, D., Kalita, J., 2013. Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor., 16(1):1–24.
-
(2013)
IEEE Commun. Surv. Tutor
, vol.16
, Issue.1
, pp. 1-24
-
-
Bhuyan, M.1
Bhattacharyya, D.2
Kalita, J.3
-
12
-
-
84935899275
-
-
Bu, Z., Bueno, P., Kashyap, R., et al., 2010. The New Era of Botnets. Available from ://.mcafee.com/in/resources/white-papers/wp-new-era-of-botnets.pdf [Accessed on Sept. 9, 2013].
-
(2010)
The New Era of Botnet
-
-
Bu, Z.1
Bueno, P.2
Kashyap, R.3
-
13
-
-
84876050983
-
Detecting botnet with clustering network traffic
-
Cai, T., Zou, F., 2012. Detecting botnet with clustering network traffic. IEEE 8th Int. Conf. on Wireless Communications, Networking and Mobile Computing, p.1–7.
-
(2012)
IEEE 8th Int. Conf. on Wireless Communications, Networking and Mobile Computin
, pp. 1-7
-
-
Cai, T.1
Zou, F.2
-
14
-
-
84875215367
-
Uma arquitetura baseada em assinaturas para mitiga cao de botnets
-
Ceron, J.M., Granville, L.Z., Tarouco, L.M., 2008. Uma arquitetura baseada em assinaturas para mitiga cao de botnets. In: X Simposio Brasileiro em Seguran ca da Informa cao e de Sistemas Computacionais (SBSeg), p.105–118 (in Portuguese).
-
(2008)
X Simposio Brasileiro em Seguran ca da Informa cao e de Sistemas Computacionais (SBSeg
, pp. 105-118
-
-
Ceron, J.M.1
Granville, L.Z.2
Tarouco, L.M.3
-
15
-
-
68049121093
-
Anomaly detection: a survey
-
Chandola, V., Banerjee, A., Kumar, V., 2009. Anomaly detection: a survey. ACM Comput. Surv., 41(3):1–58.
-
(2009)
ACM Comput. Surv
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
17
-
-
84879295934
-
Detecting web-based botnets with fast-flux domains
-
Chen, C.M., Huang, M.Z., Ou, Y.H., 2013. Detecting web-based botnets with fast-flux domains. Advances in Intelligent Systems and Applications, Volume 2. Springer, p.79–89. [doi:10.1007/978-3-642-35473-1_9]
-
(2013)
Advances in Intelligent Systems and Applications, Volume
, pp. 79-89
-
-
Chen, C.M.1
Huang, M.Z.2
Ou, Y.H.3
-
18
-
-
80052674906
-
Detecting bots via incremental LS-SVM learning with dynamic feature adaptation
-
Chen, F., Ranjan, S., Tan, P., 2011. Detecting bots via incremental LS-SVM learning with dynamic feature adaptation. Proc. 17th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, p.386–394.
-
(2011)
Proc. 17th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Minin
, pp. 386-394
-
-
Chen, F.1
Ranjan, S.2
Tan, P.3
-
19
-
-
38049035805
-
Botnet detection by monitoring group activities in DNS traffic
-
Choi, H., Lee, H., Lee, H., et al., 2007. Botnet detection by monitoring group activities in DNS traffic. 7th IEEE Int. Conf. on Computer and Information Technology, p.715–720. [doi:10.1109/CIT.2007.90]
-
(2007)
7th IEEE Int. Conf. on Computer and Information Technolog
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
-
20
-
-
72249092936
-
BotGAD: detecting botnets by capturing group activities in network traffic
-
Choi, H., Lee, H., Kim, H., 2009. BotGAD: detecting botnets by capturing group activities in network traffic. Proc. 4th Int. ICST Conf. on Communication System Software and Middleware, p.1–8. [doi:10.1145/1621890.1621893]
-
(2009)
Proc. 4th Int. ICST Conf. on Communication System Software and Middlewar
, pp. 1-8
-
-
Choi, H.1
Lee, H.2
Kim, H.3
-
21
-
-
71649112409
-
Worm virulence estimation for the containment of local worm outbreak
-
Choi, Y.H., Li, L., Liu, P., et al., 2010. Worm virulence estimation for the containment of local worm outbreak. Comput. & Secur., 29(1):104–123. [doi:10.1016/j.cose.2009.07.002]
-
(2010)
Comput. & Secur
, vol.29
, Issue.1
, pp. 104-123
-
-
Choi, Y.H.1
Li, L.2
Liu, P.3
-
25
-
-
84888402098
-
The zombie roundup: understanding, detecting, and disrupting botnets
-
Cooke, E., Jahanian, F., McPherson, D., 2005. The zombie roundup: understanding, detecting, and disrupting botnets. Proc. USENIX SRUTI Workshop, p.44.
-
(2005)
Proc. USENIX SRUTI Worksho
, pp. 44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
26
-
-
78751473146
-
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
-
Coskun, B., Dietrich, S., Memon, N., 2010. Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. Proc. 26th Annual Computer Security Applications Conf., p.131–140. [doi:10.1145/1920261.1920283]
-
(2010)
Proc. 26th Annual Computer Security Applications Conf
, pp. 131-140
-
-
Coskun, B.1
Dietrich, S.2
Memon, N.3
-
27
-
-
0141776129
-
Characterizing large DNS traces using graphs
-
Cranor, C.D., Gansner, E., Krishnamurthy, B., et al., 2001. Characterizing large DNS traces using graphs. Proc. 1st ACM SIGCOMM Workshop on Internet Measurement, p.55–67. [doi:10.1145/505202.505210]
-
(2001)
Proc. 1st ACM SIGCOMM Workshop on Internet Measuremen
, pp. 55-67
-
-
Cranor, C.D.1
Gansner, E.2
Krishnamurthy, B.3
-
28
-
-
84881102082
-
A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
-
Creech, G., Hu, J., 2013. A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans. Comput., 1(1):1–23.
-
(2013)
IEEE Trans. Comput
, vol.1
, Issue.1
, pp. 1-23
-
-
Creech, G.1
Hu, J.2
-
29
-
-
77954910362
-
The Dorothy project: an open botnet analysis framework for automatic tracking and activity visualization
-
Cremonini, M., Riccardi, M., 2009. The Dorothy project: an open botnet analysis framework for automatic tracking and activity visualization. IEEE European Conf. on Computer Network Defense, p.52–54.
-
(2009)
IEEE European Conf. on Computer Network Defens
, pp. 52-54
-
-
Cremonini, M.1
Riccardi, M.2
-
31
-
-
85084094893
-
Andbot: towards advanced mobile botnets
-
Cui, X., Fang, B., Yin, L., Xiang, C., et al., 2011. Andbot: towards advanced mobile botnets. Proc. 4th USENIX Conf. on Large-Scale Exploits and Emergent Threats, p.11.
-
(2011)
Proc. 4th USENIX Conf. on Large-Scale Exploits and Emergent Threat
, pp. 11
-
-
Cui, X.1
Fang, B.2
Yin, L.3
Xiang, C.4
-
32
-
-
84891429894
-
Modeling botnet propagation using time zones
-
Dagon, D., Zou, C.C., Lee, W., 2006. Modeling botnet propagation using time zones. NDSS, 6:2–13.
-
(2006)
NDS
, vol.6
, pp. 2-13
-
-
Dagon, D.1
Zou, C.C.2
Lee, W.3
-
33
-
-
48649089769
-
A taxonomy of botnet structures
-
Dagon, D., Gu, G., Lee, C.P., et al., 2007. A taxonomy of botnet structures. IEEE 23rd Annual Computer Security Applications Conf., p.325–339.
-
(2007)
IEEE 23rd Annual Computer Security Applications Conf
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
-
35
-
-
58149094016
-
Sybil attacks as a mitigation strategy against the Storm botnet
-
Davis, C.R., Fernandez, J.M., Neville, S., et al., 2008. Sybil attacks as a mitigation strategy against the Storm botnet. IEEE 3rd Int. Conf. on Malicious and Unwanted Software, p.32–40.
-
(2008)
IEEE 3rd Int. Conf. on Malicious and Unwanted Softwar
, pp. 32-40
-
-
Davis, C.R.1
Fernandez, J.M.2
Neville, S.3
-
37
-
-
84947273682
-
The sybil attack
-
Springer, Berlin Heidelberg:
-
Douceur, J.R., 2002. The sybil attack. In: Peer-to-Peer Systems. Springer Berlin Heidelberg, p.251–260. [doi:10.1007/3-540-45748-8_24]
-
(2002)
Peer-to-Peer System
, pp. 251-260
-
-
Douceur, J.R.1
-
39
-
-
35348815604
-
Identifying and discriminating between web and peer-to-peer traffic in the network core
-
Erman, J., Mahanti, A., Arlitt, M., et al., 2007. Identifying and discriminating between web and peer-to-peer traffic in the network core. Proc. 16th Int. Conf. on World Wide Web, p.883–892. [doi:10.1145/1242572.1242692]
-
(2007)
Proc. 16th Int. Conf. on World Wide We
, pp. 883-892
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
-
41
-
-
78650062267
-
-
Falliere, N., Murchu, L.O., Chien, E., 2011. W32.Stuxnet Dossier, Version 1.4. White Paper, Symantec Security Response.
-
(2011)
W32.Stuxnet Dossier, Version 1.4. White Paper, Symantec Security Respons
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
43
-
-
70449466618
-
A survey of botnet and botnet detection
-
Feily, M., Shahrestani, A., Ramadass, S., 2009. A survey of botnet and botnet detection. IEEE 3rd Int. Conf. on Emerging Security Information, Systems and Technologies, p.268–273.
-
(2009)
IEEE 3rd Int. Conf. on Emerging Security Information, Systems and Technologie
, pp. 268-273
-
-
Feily, M.1
Shahrestani, A.2
Ramadass, S.3
-
46
-
-
77954950954
-
Symantec Internet Security Threat Report Trends for 2010
-
Fossi, M., Egan, G., Haley, K., et al., 2011. Symantec Internet Security Threat Report Trends for 2010. Symantec Internet Security Threat Report, Volume 16, p.1–20.
-
(2011)
Symantec Internet Security Threat Report, Volume 1
, pp. 1-20
-
-
Fossi, M.1
Egan, G.2
Haley, K.3
-
47
-
-
85006566409
-
Storm Worm Network Shrinks to About One-Tenth of Its Former Size
-
Francia, R., 2007. Storm Worm Network Shrinks to About One-Tenth of Its Former Size. Tech. Blorge. Com., p.10–21.
-
(2007)
Tech. Blorge. Com
, pp. 10-21
-
-
Francia, R.1
-
48
-
-
79956034020
-
BotTrack: tracking botnets using NetFlow and PageRank
-
François, J., Wang, S., Engel, T., 2011. BotTrack: tracking botnets using NetFlow and PageRank. NETWORKING, p.1–14.
-
(2011)
NETWORKIN
, pp. 1-14
-
-
François, J.1
Wang, S.2
Engel, T.3
-
49
-
-
33646054897
-
Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks
-
Freiling, F.C., Holz, T., Wicherski, G., 2005. Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks. Springer Berlin Heidelberg, p.319–335.
-
(2005)
Springer Berlin Heidelber
, pp. 319-335
-
-
Freiling, F.C.1
Holz, T.2
Wicherski, G.3
-
50
-
-
84874290041
-
On effective sampling techniques for host-based intrusion detection in MANET
-
Ge, L., Liu, H., Zhang, D., et al., 2012. On effective sampling techniques for host-based intrusion detection in MANET. IEEE Military Communications Conf., p.1–6.
-
(2012)
IEEE Military Communications Conf
, pp. 1-6
-
-
Ge, L.1
Liu, H.2
Zhang, D.3
-
55
-
-
85093847546
-
Peer-to-peer botnets: overview and case study
-
Grizzard, J., Sharma, V., Nunnery, C., 2007. Peer-to-peer botnets: overview and case study. Proc. 1st USENIX Workshop on Hot Topics in Understanding Botnets, p.1.
-
(2007)
Proc. 1st USENIX Workshop on Hot Topics in Understanding Botnet
, pp. 1
-
-
Grizzard, J.1
Sharma, V.2
Nunnery, C.3
-
56
-
-
85061529860
-
Bothunter: detecting malware infection through IDS-driven dialog correlation
-
Gu, G., Porras, P., Yegneswaran, V., et al., 2007. Bothunter: detecting malware infection through IDS-driven dialog correlation. Proc. 16th USENIX Security Symp., p.167–182.
-
(2007)
Proc. 16th USENIX Security Symp
, pp. 167-182
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
-
57
-
-
85175133385
-
BotSniffer: detecting botnet command and control channels in network traffic
-
Gu, G., Zhang, J., Lee, W., 2008a. BotSniffer: detecting botnet command and control channels in network traffic. Proc. 15th Annual Network and Distributed System Security Symp., p.2–19.
-
(2008)
Proc. 15th Annual Network and Distributed System Security Symp
, pp. 2-19
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
58
-
-
85075837457
-
BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., et al., 2008b. BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. USENIX Security Symp., p.139–154.
-
(2008)
USENIX Security Symp
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
-
59
-
-
77950820631
-
Active botnet probing to identify obscure command and control channels
-
Gu, G., Yegneswaran, V., Porras, P., et al., 2009. Active botnet probing to identify obscure command and control channels. IEEE Annual Computer Security Applications Conf., p.241–253.
-
(2009)
IEEE Annual Computer Security Applications Conf
, pp. 241-253
-
-
Gu, G.1
Yegneswaran, V.2
Porras, P.3
-
60
-
-
70450080949
-
On the effectiveness of structural detection and defense against P2P-based botnets
-
Ha, D.T., Yan, G., Eidenbenz, S., et al., 2009. On the effectiveness of structural detection and defense against P2P-based botnets. IEEE/IFIP Int. Conf. on Dependable Systems & Networks, p.297–306.
-
(2009)
IEEE/IFIP Int. Conf. on Dependable Systems & Network
, pp. 297-306
-
-
Ha, D.T.1
Yan, G.2
Eidenbenz, S.3
-
61
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: a case study on Storm worm
-
Holz, T., Steiner, M., Dahl, F., et al., 2008. Measurements and mitigation of peer-to-peer-based botnets: a case study on Storm worm. LEET, 8(1):1–9.
-
(2008)
LEE
, vol.8
, Issue.1
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
-
62
-
-
77954494711
-
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection
-
Huang, S.Y., Mao, C.H., Lee, H.M., 2010. Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.101–111.
-
(2010)
Proc. 5th ACM Symp. on Information, Computer and Communications Securit
, pp. 101-111
-
-
Huang, S.Y.1
Mao, C.H.2
Lee, H.M.3
-
63
-
-
51849168538
-
Behavior analysis of spam botnets
-
Husna, H., Phithakkitnukoon, S., Palla, S., et al., 2008. Behavior analysis of spam botnets. IEEE 3rd Int. Conf. on Communication Systems Software and Middleware and Workshops, p.246–253.
-
(2008)
IEEE 3rd Int. Conf. on Communication Systems Software and Middleware and Workshop
, pp. 246-253
-
-
Husna, H.1
Phithakkitnukoon, S.2
Palla, S.3
-
64
-
-
70449650721
-
Botnets as a vehicle for online crime
-
Ianelli, N., Hackworth, A., 2005. Botnets as a vehicle for online crime. CERT Coordination Center, 1(1):28.
-
(2005)
CERT Coordination Cente
, vol.1
, Issue.1
, pp. 28
-
-
Ianelli, N.1
Hackworth, A.2
-
65
-
-
42149143451
-
Network monitoring using traffic dispersion graphs (TDGS)
-
Iliofotou, M., Pappu, P., Faloutsos, M., et al., 2007. Network monitoring using traffic dispersion graphs (TDGS). Proc. 7th ACM SIGCOMM Conf. on Internet Measurement, p.315–320. [doi:10.1145/1298306.1298349]
-
(2007)
Proc. 7th ACM SIGCOMM Conf. on Internet Measuremen
, pp. 315-320
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
-
67
-
-
85006566431
-
-
Janssen, C., 2011. Global Threat Bot (GTbot). Available from ://.techopedia.com/definition/59/global-threat-bot-gtbot [Accessed on May 6, 2014].
-
(2011)
Global Threat Bot (GTbot
-
-
Janssen, C.1
-
68
-
-
79955026353
-
Modeling network-level impacts of P2P flows
-
Jelasity, M., Bilicki, V., Kasza, M., 2011. Modeling network-level impacts of P2P flows. 19th IEEE Euromicro Int. Conf. on Parallel, Distributed and Network-Based Processing, p.590–594.
-
(2011)
19th IEEE Euromicro Int. Conf. on Parallel, Distributed and Network-Based Processin
, pp. 590-594
-
-
Jelasity, M.1
Bilicki, V.2
Kasza, M.3
-
69
-
-
84872050914
-
An evaluation model of botnet based on peer to peer
-
Jian, G., Zheng, K., Yang, Y., et al., 2012. An evaluation model of botnet based on peer to peer. IEEE 4th Int. Conf. on Computational Intelligence and Communication Networks, p.925–929.
-
(2012)
IEEE 4th Int. Conf. on Computational Intelligence and Communication Network
, pp. 925-929
-
-
Jian, G.1
Zheng, K.2
Yang, Y.3
-
70
-
-
79957629730
-
Identifying suspicious activities through DNS failure graph analysis
-
Jiang, N., Cao, J., Jin, Y., et al., 2010. Identifying suspicious activities through DNS failure graph analysis. 18th IEEE Int. Conf. on Network Protocols, p.144–153. [doi:10.1109/ICNP.2010.5762763]
-
(2010)
18th IEEE Int. Conf. on Network Protocol
, pp. 144-153
-
-
Jiang, N.1
Cao, J.2
Jin, Y.3
-
71
-
-
70449412215
-
Botnet: classification, attacks, detection, tracing, and preventive measures
-
Jing, L., Yang, X., Kaveh, G., et al., 2009. Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP J. Wirel. Commun. Network., 2009: 1–11.
-
(2009)
EURASIP J. Wirel. Commun. Network
, vol.2009
, pp. 1-11
-
-
Jing, L.1
Yang, X.2
Kaveh, G.3
-
72
-
-
85076932663
-
Studying spamming botnets using Botlab
-
John, J.P., Moshchuk, A., Gribble, S.D., et al., 2009. Studying spamming botnets using Botlab. NSDI, p.291–306.
-
(2009)
NSD
, pp. 291-306
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
-
73
-
-
71249107440
-
Botnet statistical analysis tool for limited resource computer emergency response team
-
Kaemarungsi, K., Yoskamtorn, N., Jirawannakool, K., et al., 2009. Botnet statistical analysis tool for limited resource computer emergency response team. IEEE 5th Int. Conf. on IT Security Incident Management and IT Forensics, p.27–40. [doi:10.1109/IMF.2009.13]
-
(2009)
IEEE 5th Int. Conf. on IT Security Incident Management and IT Forensic
, pp. 27-40
-
-
Kaemarungsi, K.1
Yoskamtorn, N.2
Jirawannakool, K.3
-
75
-
-
77952351261
-
Towards complete node enumeration in a peer-to-peer botnet
-
Kang, B.B., Chan-Tin, E., Lee, C.P., et al., 2009. Towards complete node enumeration in a peer-to-peer botnet. Proc. 4th Int. Symp. on Information, Computer, and Communications Security, p.23–34. [doi:10.1145/1533057.1533064]
-
(2009)
Proc. 4th Int. Symp. on Information, Computer, and Communications Securit
, pp. 23-34
-
-
Kang, B.B.1
Chan-Tin, E.2
Lee, C.P.3
-
76
-
-
74049144153
-
Application entropy theory to detect new peer-to-peer botnet with multi-chart CUSUM
-
Kang, J., Zhang, J.Y., 2009. Application entropy theory to detect new peer-to-peer botnet with multi-chart CUSUM. IEEE 2nd Int. Symp. on Electronic Commerce and Security, p.470–474.
-
(2009)
IEEE 2nd Int. Symp. on Electronic Commerce and Securit
, pp. 470-474
-
-
Kang, J.1
Zhang, J.Y.2
-
77
-
-
26844461829
-
-
University of California, Riverside, USA:
-
Karagiannis, T., Broido, A., Brownlee, N., et al., 2003. File-sharing in the Internet: a characterization of P2P traffic in the backbone. Technical Report, University of California, Riverside, USA.
-
(2003)
File-sharing in the Internet: a characterization of P2P traffic in the backbon
-
-
Karagiannis, T.1
Broido, A.2
Brownlee, N.3
-
78
-
-
14944345677
-
Transport layer identification of P2P traffic
-
Karagiannis, T., Broido, A., Faloutsos, M., 2004. Transport layer identification of P2P traffic. Proc. 4th ACM SIGCOMM Conf. on Internet Measurement, p.121–134. [doi:10.1145/1028788.1028804]
-
(2004)
Proc. 4th ACM SIGCOMM Conf. on Internet Measuremen
, pp. 121-134
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
-
79
-
-
33847303101
-
BLINC: multilevel traffic classification in the dark
-
Karagiannis, T., Papagiannaki, K., Faloutsos, M., 2005. BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Comput. Commun. Rev., 35(4):229–240. [doi:10.1145/1090191.1080119]
-
(2005)
ACM SIGCOMM Comput. Commun. Rev
, vol.35
, Issue.4
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
80
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
Karasaridis, A., Rexroad, B., Hoeflin, D., 2007. Wide-scale botnet detection and characterization. Proc. first Conf. on 1st Workshop on Hot Topics in Understanding Botnets, p.1–8.
-
(2007)
Proc. first Conf. on 1st Workshop on Hot Topics in Understanding Botnet
, pp. 1-8
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
82
-
-
84875216642
-
-
Keizer, G., 2008. Top Botnets Control 1M Hijacked Computers. Available from ://.computerworld.com/article/2536378/security0/top-botnets-control-1mhijacked-computers.html [Accessed on Sept. 8, 2013].
-
(2008)
Top Botnets Control 1M Hijacked Computer
-
-
Keizer, G.1
-
83
-
-
85006640538
-
-
Kespersky, 2011. How to Detect and Remove the Rootkit TDL4. Available from ://infoaleph.wordpress.com/2011/07/03/como-detectar-y-borrar-el-rootkit-tdl4-tdssalureon/ [Accessed on June 20, 2013].
-
(2011)
How to Detect and Remove the Rootkit TDL
-
-
Kespersky1
-
84
-
-
50249168251
-
Bot detection based on traffic analysis
-
Kugisaki, Y., Kasahara, Y., Hori, Y., et al., 2007. Bot detection based on traffic analysis. IEEE Int. Conf. on Intelligent Pervasive Computing, p.303–306.
-
(2007)
IEEE Int. Conf. on Intelligent Pervasive Computin
, pp. 303-306
-
-
Kugisaki, Y.1
Kasahara, Y.2
Hori, Y.3
-
86
-
-
70349706233
-
A first step towards characterizing stealthy botnets
-
Leonard, J., Xu, S., Sandhu, R., 2009. A first step towards characterizing stealthy botnets. IEEE Int. Conf. on Availability, Reliability and Security, p.106–113.
-
(2009)
IEEE Int. Conf. on Availability, Reliability and Securit
, pp. 106-113
-
-
Leonard, J.1
Xu, S.2
Sandhu, R.3
-
87
-
-
77951447962
-
Botnet: survey and case study
-
Li, C., Jiang, W., Zou, X., 2009. Botnet: survey and case study. IEEE 4th Int. Conf. on Innovative Computing, Information and Control, p.1184–1187.
-
(2009)
IEEE 4th Int. Conf. on Innovative Computing, Information and Contro
, pp. 1184-1187
-
-
Li, C.1
Jiang, W.2
Zou, X.3
-
88
-
-
77952395048
-
Automating analysis of large-scale botnet probing events
-
Li, Z., Goyal, A., Chen, Y., et al., 2009. Automating analysis of large-scale botnet probing events. Proc. 4th Int. Symp. on Information, Computer, and Communications Security, p.11–22.
-
(2009)
Proc. 4th Int. Symp. on Information, Computer, and Communications Securit
, pp. 11-22
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
-
90
-
-
78651429288
-
A P2P-botnet detection model and algorithms based on network streams analysis
-
Liu, D., Li, Y., Hu, Y., et al., 2010. A P2P-botnet detection model and algorithms based on network streams analysis. IEEE Int. Conf. on Future Information Technology and Management Engineering, p.55–58.
-
(2010)
IEEE Int. Conf. on Future Information Technology and Management Engineerin
, pp. 55-58
-
-
Liu, D.1
Li, Y.2
Hu, Y.3
-
91
-
-
70350786131
-
A new method of P2P traffic identification based on support vector machine at the host level
-
Liu, F., Li, Z., Nie, Q., 2009. A new method of P2P traffic identification based on support vector machine at the host level. IEEE Int. Conf. on Information Technology and Computer Science, p.579–582.
-
(2009)
IEEE Int. Conf. on Information Technology and Computer Scienc
, pp. 579-582
-
-
Liu, F.1
Li, Z.2
Nie, Q.3
-
92
-
-
56649124591
-
BotTracer: execution-based bot-like malware detection
-
Liu, L., Chen, S., Yan, G., et al., 2008. BotTracer: execution-based bot-like malware detection. In: Information Security. Springer Berlin Heidelberg, p.97–113. [doi:10.1007/978-3-540-85886-7_7]
-
(2008)
Information Securit
, pp. 97-113
-
-
Liu, L.1
Chen, S.2
Yan, G.3
-
93
-
-
46149123241
-
Using machine learning technliques to identify botnet traffic
-
Livadas, C., Walsh, R., Lapsley, D., et al., 2006. Using machine learning technliques to identify botnet traffic. Proc. 31st IEEE Conf. on Local Computer Networks, p.967–974.
-
(2006)
Proc. 31st IEEE Conf. on Local Computer Network
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
-
95
-
-
77952376102
-
Automatic discovery of botnet communities on large-scale communication networks
-
Lu, W., Tavallaee, M., Ghorbani, A., 2009a. Automatic discovery of botnet communities on large-scale communication networks. Proc. 4th Int. Symp. on Information, Computer, and Communications Security, p.1–10.
-
(2009)
Proc. 4th Int. Symp. on Information, Computer, and Communications Securit
, pp. 1-10
-
-
Lu, W.1
Tavallaee, M.2
Ghorbani, A.3
-
96
-
-
67650296183
-
BotCop: an online botnet traffic classifier
-
Lu, W., Tavallaee, M., Rammidi, G., et al., 2009b. BotCop: an online botnet traffic classifier. 7th IEEE Annual Communication Networks and Services Research Conf., p.70–77.
-
(2009)
7th IEEE Annual Communication Networks and Services Research Conf
, pp. 70-77
-
-
Lu, W.1
Tavallaee, M.2
Rammidi, G.3
-
97
-
-
80053983786
-
A longitudinal study of P2P traffic classification
-
Madhukar, A., Williamson, C., 2006. A longitudinal study of P2P traffic classification. 14th IEEE Int. Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, p.179–188. [doi:10.1109/MASCOTS.2006.6]
-
(2006)
14th IEEE Int. Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication System
, pp. 179-188
-
-
Madhukar, A.1
Williamson, C.2
-
99
-
-
74049124161
-
Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations
-
Mansmann, F., Fischer, F., Keim, D.A., et al., 2009. Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations. Proc. Symp. on Computer Human Interaction for the Management of Information Technology, p.3.
-
(2009)
Proc. Symp. on Computer Human Interaction for the Management of Information Technolog
, pp. 3
-
-
Mansmann, F.1
Fischer, F.2
Keim, D.A.3
-
101
-
-
85006603709
-
-
Marry, W., 2010. Pushdo Botnet. Available from ://msmvps.com/blogs/harrywaldron/archive/2010/02/02/pushdo-botnet-new-ddos-attacks-on-major-web-sites.aspx.
-
(2010)
Pushdo Botne
-
-
Marry, W.1
-
103
-
-
63749106613
-
Flow-based identification of botnet traffic by mining multiple log files
-
Masud, M.M., Al-Khateeb, T., Khan, L., et al., 2008. Flow-based identification of botnet traffic by mining multiple log files. IEEE 1st Int. Conf. on Distributed Framework and Applications, p.200–206.
-
(2008)
IEEE 1st Int. Conf. on Distributed Framework and Application
, pp. 200-206
-
-
Masud, M.M.1
Al-Khateeb, T.2
Khan, L.3
-
104
-
-
3042784584
-
Botnets: big and bigger
-
McCarty, B., 2003. Botnets: big and bigger. IEEE Secur. Priv., 1(4):87–90. [doi:10.1109/MSECP.2003.1219079]
-
(2003)
IEEE Secur. Priv
, vol.1
, Issue.4
, pp. 87-90
-
-
McCarty, B.1
-
105
-
-
85006625180
-
-
McMillan, R., 2009. Experts Bicker over Conficker Numbers. Available from ://news.techworld.com/security/114307/experts-bicker-over-conficker-numbers/ [Accessed on Oct. 14, 2013].
-
(2009)
Experts Bicker over Conficker Number
-
-
McMillan, R.1
-
108
-
-
85006614255
-
The Rustock Botnet Spams Again
-
Miller, C., 2008. The Rustock Botnet Spams Again. SC Magazine, July 25.
-
(2008)
SC Magazine, July 2
-
-
Miller, C.1
-
114
-
-
34547381069
-
Integrated visualization system for monitoring security in large-scale local area network
-
Mukosaka, S., Koike, H., 2007. Integrated visualization system for monitoring security in large-scale local area network. IEEE 6th Int. Asia-Pacific Symp. on Visualization, p.41–44.
-
(2007)
IEEE 6th Int. Asia-Pacific Symp. on Visualizatio
, pp. 41-44
-
-
Mukosaka, S.1
Koike, H.2
-
118
-
-
85059753615
-
BotGrep: finding P2P bots with structured graph analysis
-
Nagaraja, S., Mittal, P., Hong, C., et al., 2010. BotGrep: finding P2P bots with structured graph analysis. USENIX Security Symp., p.95–110.
-
(2010)
USENIX Security Symp
, pp. 95-110
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.3
-
120
-
-
37849009457
-
Characterizing dark DNS behavior
-
Oberheide, J., Karir, M., Mao, Z., 2007. Characterizing dark DNS behavior. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, p.140–156. [doi:10.1007/978-3-540-73614-1_9]
-
(2007)
Detection of Intrusions and Malware, and Vulnerability Assessment. Springe
, pp. 140-156
-
-
Oberheide, J.1
Karir, M.2
Mao, Z.3
-
122
-
-
85006627074
-
-
Paranoid, 2004. The Dangers of S. Available from ://.wilderssecurity.com/threads/the-dangers-ofs.31087/ [Accessed on Oct. 5, 2013].
-
(2004)
The Dangers of
-
-
Paranoid1
-
123
-
-
47949094673
-
Towards practical framework for collecting and analyzing network-centric attacks
-
Paxton, N., Ahn, G.J., Chu, B., et al., 2007. Towards practical framework for collecting and analyzing network-centric attacks. IEEE Int. Conf. on Information Reuse and Integration, p.73–78. [doi:10.1109/IRI.2007.4296600]
-
(2007)
IEEE Int. Conf. on Information Reuse and Integratio
, pp. 73-78
-
-
Paxton, N.1
Ahn, G.J.2
Chu, B.3
-
124
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive dns traces
-
Perdisci, R., Corona, I., Dagon, D., et al., 2009. Detecting malicious flux service networks through passive analysis of recursive dns traces. IEEE Annual Computer Security Applications Conf., p.311–320.
-
(2009)
IEEE Annual Computer Security Applications Conf
, pp. 311-320
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
-
125
-
-
79951851851
-
Honeypot trace forensics: the observation viewpoint matters
-
Pham, V.H., Dacier, M., 2011. Honeypot trace forensics: the observation viewpoint matters. Fut. Gener. Comput. Syst., 27(5):539–546. [doi:10.1016/j.future.2010.06.004]
-
(2011)
Fut. Gener. Comput. Syst
, vol.27
, Issue.5
, pp. 539-546
-
-
Pham, V.H.1
Dacier, M.2
-
126
-
-
84920902706
-
Botnets: Detection, Measurement, Disinfection & Defence
-
Plohmann, D., Gerhards-Padilla, E., Leder, F., 2011. Botnets: Detection, Measurement, Disinfection & Defence. The European Network and Information Security Agency (ENISA).
-
(2011)
The European Network and Information Security Agency (ENISA
-
-
Plohmann, D.1
Gerhards-Padilla, E.2
Leder, F.3
-
127
-
-
85006616145
-
-
Plohmann, D., Gerhards-Padilla, E., Leder, F., 2011. Botnets: 10 Tough Questions. Available from s://.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-10-tough-questions [Accessed on Dec. 20, 2013].
-
(2011)
Botnets: 10 Tough Question
-
-
Plohmann, D.1
Gerhards-Padilla, E.2
Leder, F.3
-
132
-
-
84894040059
-
Bots & Botnet: an Overview
-
Puri, R., 2003. Bots & Botnet: an Overview. SANS Institute.
-
(2003)
SANS Institut
-
-
Puri, R.1
-
133
-
-
84864705781
-
-
Qiao, Y., Yang, Y., He, J., et al., 2012. Detecting parasite P2P botnet in eMule-like networks through quasi-periodicity recognition. Information Security and Cryptology-ICISC, p.127–139.
-
(2012)
Detecting parasite P2P botnet in eMule-like networks through quasi-periodicity recognition. Information Security and Cryptology-ICIS
, pp. 127-139
-
-
Qiao, Y.1
Yang, Y.2
He, J.3
-
134
-
-
85006639810
-
-
Raff, A., 2012. Ramnit Goes Social. Available from ://.seculert.com/blog/2012/01/ramnit-goes-social.html [Accessed on Dec. 5, 2013].
-
(2012)
Ramnit Goes Socia
-
-
Raff, A.1
-
135
-
-
84862323048
-
Classification of botnet detection based on botnet architechture
-
Raghava, N.S., Sahgal, D., Chandna, S., 2012. Classification of botnet detection based on botnet architechture. IEEE Int. Conf. on Communication Systems and Network Technologies, p.569–572.
-
(2012)
IEEE Int. Conf. on Communication Systems and Network Technologie
, pp. 569-572
-
-
Raghava, N.S.1
Sahgal, D.2
Chandna, S.3
-
136
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
Ramachandran, A., Feamster, N., 2006. Understanding the network-level behavior of spammers. ACM SIGCOMM Comput. Commun. Rev., 36(4):291–302. [doi:10.1145/1151659.1159947]
-
(2006)
ACM SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.4
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
137
-
-
77952717608
-
Revealing botnet membership using DNSBL counter-intelligence
-
Ramachandran, A., Feamster, N., Dagon, D., et al., 2006. Revealing botnet membership using DNSBL counter-intelligence. Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet, p.49–54.
-
(2006)
Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Interne
, pp. 49-54
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
138
-
-
77954740531
-
Botzilla: detecting the phoning home of malicious software
-
Rieck, K., Schwenk, G., Limmer, T., et al., 2010. Botzilla: detecting the phoning home of malicious software. Proc. ACM Symp. on Applied Computing, p. 1978–1984.
-
(2010)
Proc. ACM Symp. on Applied Computin
, pp. 1978-1984
-
-
Rieck, K.1
Schwenk, G.2
Limmer, T.3
-
139
-
-
84885213527
-
Survey and taxonomy of botnet research through life-cycle
-
Rodríguez-Gómez, R.A., Maciá-Fernández, G., García-Teodoro, P., 2013. Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv., 45(4): 1–33.
-
(2013)
ACM Comput. Surv
, vol.45
, Issue.4
, pp. 1-33
-
-
Rodríguez-Gómez, R.A.1
Maciá-Fernández, G.2
García-Teodoro, P.3
-
140
-
-
79955986577
-
A statistical approach to botnet virulence estimation
-
Rrushi, J., Mokhtari, E., Ghorbani, A.A., 2011. A statistical approach to botnet virulence estimation. Proc. 6th ACM Symp. on Information, Computer and Communications Security, p.508–512.
-
(2011)
Proc. 6th ACM Symp. on Information, Computer and Communications Securit
, pp. 508-512
-
-
Rrushi, J.1
Mokhtari, E.2
Ghorbani, A.A.3
-
141
-
-
84870604278
-
Privacy regulations for cloud computing: compliance and implementation in theory and practice
-
Ruiter, J., Warnier, M., 2011. Privacy regulations for cloud computing: compliance and implementation in theory and practice. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, p.361–376. [doi:10.1007/978-94-007-0641-5_17]
-
(2011)
Computers, Privacy and Data Protection: an Element of Choic
, pp. 361-376
-
-
Ruiter, J.1
Warnier, M.2
-
142
-
-
36248986670
-
Botnet: an overview
-
Saha, B., Gairola, A., 2005. Botnet: an overview. CERT-In, White Paper, CIWP-2005-05, 240.
-
(2005)
CERT-In, White Paper, CIWP-2005-0
, pp. 240
-
-
Saha, B.1
Gairola, A.2
-
143
-
-
85006569245
-
Blocking spam by separating end-user machines from legitimate mail server machines
-
Sanchez, F., Duan, Z., Dong, Y., 2012. Blocking spam by separating end-user machines from legitimate mail server machines. Secur. Commun. Networks, p.1–9.
-
(2012)
Secur. Commun. Network
, pp. 1-9
-
-
Sanchez, F.1
Duan, Z.2
Dong, Y.3
-
145
-
-
37549039673
-
-
Syngress, Rockland:
-
Schiller, C., Binkley, J., Harley, D., et al., 2011. Botnets-the Killer Web APP. Syngress, Rockland.
-
(2011)
Botnets-the Killer Web AP
-
-
Schiller, C.1
Binkley, J.2
Harley, D.3
-
149
-
-
85006561897
-
-
Sevcenco, S., 2012. SdBot. Available from ://.symantec.com/security_response/writeup.jspdocid=2002-051312-3628-99 [Accessed on Dec. 14, 2013].
-
(2012)
SdBo
-
-
Sevcenco, S.1
-
150
-
-
77951130249
-
Architecture for applying data mining and visualization on network flow for botnet traffic detection
-
Shahrestani, A., Feily, M., Ahmad, R., et al., 2009. Architecture for applying data mining and visualization on network flow for botnet traffic detection. IEEE Int. Conf. on Computer Technology and Development, p.33–37.
-
(2009)
IEEE Int. Conf. on Computer Technology and Developmen
, pp. 33-37
-
-
Shahrestani, A.1
Feily, M.2
Ahmad, R.3
-
151
-
-
84929898812
-
A survey of botnet: consequences, defenses and challenges
-
Shin, Y.H., Im, E.G., 2009. A survey of botnet: consequences, defenses and challenges. Joint Workshop on Internet Security, p.1–11.
-
(2009)
Joint Workshop on Internet Securit
, pp. 1-11
-
-
Shin, Y.H.1
Im, E.G.2
-
152
-
-
84875223281
-
Botnets: a survey
-
Silva, S.S., Silva, R.M., Pinto, R.C.G., et al., 2013. Botnets: a survey. Comput. Networks, 57(2):378–403. [doi:10.1016/j.comnet.2012.07.021]
-
(2013)
Comput. Network
, vol.57
, Issue.2
, pp. 378-403
-
-
Silva, S.S.1
Silva, R.M.2
Pinto, R.C.G.3
-
153
-
-
84871942598
-
Analyzing the behavior of top spam botnets
-
Sousa, R., Rodrigues, N., Salvador, P., et al., 2012. Analyzing the behavior of top spam botnets. IEEE Int. Conf. on Communications, p.6540–6544.
-
(2012)
IEEE Int. Conf. on Communication
, pp. 6540-6544
-
-
Sousa, R.1
Rodrigues, N.2
Salvador, P.3
-
155
-
-
80053943682
-
A framework for DNS based detection and mitigation of malware infections on a network
-
Stalmans, E., Irwin, B., 2011. A framework for DNS based detection and mitigation of malware infections on a network. IEEE Information Security South Africa, p.1–8.
-
(2011)
IEEE Information Security South Afric
, pp. 1-8
-
-
Stalmans, E.1
Irwin, B.2
-
160
-
-
37849037807
-
Characterizing bots’ remote control behavior
-
Stinson, E., Mitchell, J.C., 2007. Characterizing bots’ remote control behavior. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, p.89–108. [doi:10.1007/978-3-540-73614-1_6]
-
(2007)
Detection of Intrusions and Malware, and Vulnerability Assessmen
, pp. 89-108
-
-
Stinson, E.1
Mitchell, J.C.2
-
161
-
-
84865618856
-
Characterizing bots’ remote control behavior
-
Stinson, E., Mitchell, J.C., 2008. Characterizing bots’ remote control behavior. In: Botnet Detection. Springer, p.45–64. [doi:10.1007/978-0-387-68768-1_3]
-
(2008)
Botnet Detectio
, pp. 45-64
-
-
Stinson, E.1
Mitchell, J.C.2
-
162
-
-
41949115980
-
Detecting botnets with tight command and control
-
Strayer, W.T., Walsh, R., Livadas, C., et al., 2006. Detecting botnets with tight command and control. Proc. 31st IEEE Conf. on Local Computer Networks, p.195–202.
-
(2006)
Proc. 31st IEEE Conf. on Local Computer Network
, pp. 195-202
-
-
Strayer, W.T.1
Walsh, R.2
Livadas, C.3
-
163
-
-
84882753373
-
Botnet detection based on network behavior
-
Strayer, W.T., Lapsely, D., Walsh, R., et al., 2008. Botnet detection based on network behavior. In: Botnet Detection. Springer, p.1–24. [doi:10.1007/978-0-387-68768-1_1]
-
(2008)
Botnet Detection. Springe
, pp. 1-24
-
-
Strayer, W.T.1
Lapsely, D.2
Walsh, R.3
-
164
-
-
84876254320
-
-
Stringhini, G., Holz, T., Stone-Gross, B., et al., 2011. BOTMAGNIFIER: Locating Spambots on the Internet. USENIX Security Symp.
-
(2011)
BOTMAGNIFIER: Locating Spambots on the Internet. USENIX Security Sym
-
-
Stringhini, G.1
Holz, T.2
Stone-Gross, B.3
-
165
-
-
85006628261
-
-
Symantic, 2010. Bagle. Available from ://.messagelabs.com/mlireport/MLI_2010_04_Apr_FINAL_EN.pdf [Accessed on Apr. 7, 2014].
-
(2010)
Bagl
-
-
Symantic1
-
166
-
-
85006597290
-
-
Systems, C., 2012. DNS Best Practices. Available from ://.cisco.com/web/about/security/intelligence/dns-bcp.html [Accessed on Dec. 5, 2013].
-
(2012)
DNS Best Practice
-
-
Systems, C.1
-
167
-
-
84872068419
-
Evaluating the threat of epidemic mobile malware
-
Szongott, C., Henne, B., Smith, M., 2012. Evaluating the threat of epidemic mobile malware. IEEE 8th Int. Conf. on Wireless and Mobile Computing, Networking and Communications, p.443–450.
-
(2012)
IEEE 8th Int. Conf. on Wireless and Mobile Computing, Networking and Communication
, pp. 443-450
-
-
Szongott, C.1
Henne, B.2
Smith, M.3
-
169
-
-
84873838558
-
Efficient computer network anomaly detection by changepoint detection methods
-
Tartakovsky, A.G., Polunchenko, A.S., Sokolov, G., 2013. Efficient computer network anomaly detection by changepoint detection methods. IEEE J. Sel. Topics Signal Process., 7(1):4–11. [doi:10.1109/JSTSP.2013.2241912]
-
(2013)
IEEE J. Sel. Topics Signal Process
, vol.7
, Issue.1
, pp. 4-11
-
-
Tartakovsky, A.G.1
Polunchenko, A.S.2
Sokolov, G.3
-
171
-
-
80053642264
-
A strategic analysis of spam botnets operations
-
Thonnard, O., Dacier, M., 2011. A strategic analysis of spam botnets operations. Proc. 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conf., p.162–171. [doi:10.1145/2030376.2030395]
-
(2011)
Proc. 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conf
, pp. 162-171
-
-
Thonnard, O.1
Dacier, M.2
-
174
-
-
74049108559
-
On cellular botnets: measuring the impact of malicious devices on a cellular network core
-
Traynor, P., Lin, M., Ongtang, M., et al., 2009. On cellular botnets: measuring the impact of malicious devices on a cellular network core. Proc. 16th ACM Conf. on Computer and Communications Security, p.223–234.
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Securit
, pp. 223-234
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
-
176
-
-
85006569283
-
-
Trend Micro, 2013. Andrameda Botnet. Available from ://blog.trendmicro.com/trendlabs-security-intelligence/andromeda-botnet-gets-an-update/ [Accessed on Nov. 7, 2013].
-
(2013)
Andrameda Botne
-
-
Trend Micro1
-
182
-
-
67650145176
-
Swing: realistic and responsive network traffic generation
-
Vishwanath, K.V., Vahdat, A., 2009. Swing: realistic and responsive network traffic generation. IEEE/ACM Trans. Network., 17(3):712–725. [doi:10.1109/TNET.2009.2020830]
-
(2009)
IEEE/ACM Trans. Network
, vol.17
, Issue.3
, pp. 712-725
-
-
Vishwanath, K.V.1
Vahdat, A.2
-
183
-
-
77954365026
-
Modeling connections behavior for web-based bots detection
-
Wang, B., Li, Z., Li, D., et al., 2010. Modeling connections behavior for web-based bots detection. 2nd IEEE Int. Conf. on e-Business and Information System Security, p.1–4.
-
(2010)
2nd IEEE Int. Conf. on e-Business and Information System Securit
, pp. 1-4
-
-
Wang, B.1
Li, Z.2
Li, D.3
-
184
-
-
74049119824
-
Botnet detection based on analysis of mail flow
-
Wang, C., Li, T., Wang, H., 2009. Botnet detection based on analysis of mail flow. IEEE 2nd Int. Conf. on Biomedical Engineering and Informatics, p.1–4.
-
(2009)
IEEE 2nd Int. Conf. on Biomedical Engineering and Informatic
, pp. 1-4
-
-
Wang, C.1
Li, T.2
Wang, H.3
-
185
-
-
58149094526
-
-
Wang, P., Sparks, S., Zou, C., 2007. An Advanced Hybrid Peer-to-Peer Botnet. Available from ://static.usenix.org/event/hotbots07/tech/full_papers/wang/wang_html [Accessed on June 6, 2013].
-
(2007)
An Advanced Hybrid Peer-to-Peer Botne
-
-
Wang, P.1
Sparks, S.2
Zou, C.3
-
186
-
-
77952687808
-
An advanced hybrid peer-to-peer botnet
-
Wang, P., Sparks, S., Zou, C., 2010. An advanced hybrid peer-to-peer botnet. IEEE Trans. Depend. Secur. Comput., 7(2):113–127. [doi:10.1109/TDSC.2008.35]
-
(2010)
IEEE Trans. Depend. Secur. Comput
, vol.7
, Issue.2
, pp. 113-127
-
-
Wang, P.1
Sparks, S.2
Zou, C.3
-
187
-
-
67650487544
-
A novel approach to detect IRC-based botnets
-
Wang, W., Fang, B., Zhang, Z., et al., 2009. A novel approach to detect IRC-based botnets. IEEE Int. Conf. on Networks Security, Wireless Communications and Trusted Computing, p.408–411.
-
(2009)
IEEE Int. Conf. on Networks Security, Wireless Communications and Trusted Computin
, pp. 408-411
-
-
Wang, W.1
Fang, B.2
Zhang, Z.3
-
188
-
-
85006625192
-
-
Wang, X.R., 2003. Eggdrop. Available from ://.symantec.com/security_response/writeup.jspdocid=2003-041013-5338-99 [Accessed on July 8, 2013].
-
(2003)
Eggdro
-
-
Wang, X.R.1
-
189
-
-
77954261822
-
The detection of IRC botnet based on abnormal behavior
-
Wang, Z., Wang, J., Huang, W., et al., 2010. The detection of IRC botnet based on abnormal behavior. 2nd IEEE Int. Conf. on Multimedia and Information Technology, p.146–149.
-
(2010)
2nd IEEE Int. Conf. on Multimedia and Information Technolog
, pp. 146-149
-
-
Wang, Z.1
Wang, J.2
Huang, W.3
-
191
-
-
33746144908
-
Tmix: a tool for generating realistic TCP application workloads in ns-2
-
Weigle, M.C., Adurthi, P., Hernández-Campos, F., et al., 2006. Tmix: a tool for generating realistic TCP application workloads in ns-2. ACM SIGCOMM Comput. Commun. Rev., 36(3):65–76. [doi:10.1145/1140086.1140094]
-
(2006)
ACM SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.3
, pp. 65-76
-
-
Weigle, M.C.1
Adurthi, P.2
Hernández-Campos, F.3
-
192
-
-
84873433323
-
Search result diversity for informational queries
-
Welch, M.J., Cho, J., Olston, C., 2011. Search result diversity for informational queries. Proc. 20th Int. Conf. on World Wide Web, p.237–246. [doi:10.1145/1963405.1963441]
-
(2011)
Proc. 20th Int. Conf. on World Wide We
, pp. 237-246
-
-
Welch, M.J.1
Cho, J.2
Olston, C.3
-
193
-
-
85006603738
-
-
Wikipedia, 1998. NetBus. Available from ://en.wikipedia.org/wiki/NetBus [Accessed on Aug. 7, 2013].
-
(1998)
NetBu
-
-
Wikipedia1
-
194
-
-
85006614288
-
-
Wikipedia, 2013a. Anomaly Detection. Available from ://en.wikipedia.org/wiki/Anomaly_detection [Accessed on Aug. 7, 2013].
-
(2013)
Anomaly Detectio
-
-
Wikipedia1
-
195
-
-
85006571862
-
-
Wikipedia, 2013b. Botnets. Available from ://en.wikipedia.org/wiki/Botnet [Accessed on Aug. 7, 2013].
-
(2013)
Botnet
-
-
Wikipedia1
-
196
-
-
85006615514
-
-
Wikipedia, 2013c. Mariposa Botnet. Available from ://en.wikipedia.org/wiki/Mariposa_botnet [Accessed on Aug. 7, 2013].
-
(2013)
Mariposa Botne
-
-
Wikipedia1
-
197
-
-
19544380593
-
Inferring relative popularity of Internet applications by actively querying DNS caches
-
Wills, C.E., Mikhailov, M., Shang, H., 2003. Inferring relative popularity of Internet applications by actively querying DNS caches. Proc. 3rd ACM SIGCOMM Conf. on Internet Measurement, p.78–90.
-
(2003)
Proc. 3rd ACM SIGCOMM Conf. on Internet Measuremen
, pp. 78-90
-
-
Wills, C.E.1
Mikhailov, M.2
Shang, H.3
-
198
-
-
85006583472
-
-
WordPress, 2008. Social VPN. Available from ://socialvpn.wordpress.com/ [Accessed on Dec. 25, 2013].
-
(2008)
Social VP
-
-
WordPress1
-
199
-
-
70350374367
-
Automatically generating models for botnet detection
-
Wurzinger, P., Bilge, L., Holz, T., et al., 2009. Automatically generating models for botnet detection. Computer Security ESORICS, p.232–249.
-
(2009)
Computer Security ESORIC
, pp. 232-249
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
-
200
-
-
81055138290
-
Detecting infection onset with behavior-based policies
-
Xu, K., Yao, D., Ma, Q., et al., 2011. Detecting infection onset with behavior-based policies. 5th IEEE Int. Conf. on Network and System Security, p.57–64.
-
(2011)
5th IEEE Int. Conf. on Network and System Securit
, pp. 57-64
-
-
Xu, K.1
Yao, D.2
Ma, Q.3
-
201
-
-
84869435137
-
PeerPress: utilizing enemies’ P2P strength against them
-
Xu, Z., Chen, L., Gu, G., et al., 2012. PeerPress: utilizing enemies’ P2P strength against them. Proc. ACM Conf. on Computer and Communications Security, p.581–592.
-
(2012)
Proc. ACM Conf. on Computer and Communications Securit
, pp. 581-592
-
-
Xu, Z.1
Chen, L.2
Gu, G.3
-
203
-
-
77952683499
-
The design and implementation of host-based intrusion detection system
-
Ying, L., Yan, Z., Ou, Y.J., 2010. The design and implementation of host-based intrusion detection system. 3rd IEEE Int. Symp. on Intelligent Information Technology and Security Informatics, p.595–598. [doi:10.1109/IITSI.2010.127]
-
(2010)
3rd IEEE Int. Symp. on Intelligent Information Technology and Security Informatic
, pp. 595-598
-
-
Ying, L.1
Yan, Z.2
Ou, Y.J.3
-
204
-
-
77950911630
-
SBotMiner: large scale search bot detection
-
Yu, F., Xie, Y., Ke, Q., 2010. SBotMiner: large scale search bot detection. Proc. 3rd ACM Int. Conf. on Web Search and Data Mining, p.421–430. [doi:10.1145/1718487.1718540]
-
(2010)
Proc. 3rd ACM Int. Conf. on Web Search and Data Minin
, pp. 421-430
-
-
Yu, F.1
Xie, Y.2
Ke, Q.3
-
205
-
-
71049178878
-
Online botnet detection by continuous similarity monitoring
-
Yu, X., Dong, X., Yu, G., et al., 2009. Online botnet detection by continuous similarity monitoring. IEEE Int. Symp. on Information Engineering and Electronic Commerce, p.145–149.
-
(2009)
IEEE Int. Symp. on Information Engineering and Electronic Commerc
, pp. 145-149
-
-
Yu, X.1
Dong, X.2
Yu, G.3
-
206
-
-
78651593637
-
Online botnet detection based on incremental discrete Fourier transform
-
Yu, X., Dong, X., Yu, G., et al., 2010. Online botnet detection based on incremental discrete Fourier transform. J. Networks, 5(5):568–576. [doi:10.4304/jnw.5.5.568-576]
-
(2010)
J. Network
, vol.5
, Issue.5
, pp. 568-576
-
-
Yu, X.1
Dong, X.2
Yu, G.3
-
208
-
-
77958527473
-
A taxonomy of botnet detection techniques
-
Zeidanloo, H.R., Shooshtari, M.J.Z., Amoli, P.V., et al., 2010. A taxonomy of botnet detection techniques. 3rd IEEE Int. Conf. on Computer Science and Information Technology, p.158–162.
-
(2010)
3rd IEEE Int. Conf. on Computer Science and Information Technolog
, pp. 158-162
-
-
Zeidanloo, H.R.1
Shooshtari, M.J.Z.2
Amoli, P.V.3
-
209
-
-
79960678642
-
Measuring the effectiveness of infrastructure-level detection of large-scale botnets
-
Zeng, Y., Yan, G., Eidenbenz, S., et al., 2011. Measuring the effectiveness of infrastructure-level detection of large-scale botnets. IEEE 19th Int. Workshop on Quality of Service, p.1–9.
-
(2011)
IEEE 19th Int. Workshop on Quality of Servic
, pp. 1-9
-
-
Zeng, Y.1
Yan, G.2
Eidenbenz, S.3
-
210
-
-
79956014847
-
Boosting the scalability of botnet detection using adaptive traffic sampling
-
Zhang, J., Luo, X., Perdisci, R., et al., 2011a. Boosting the scalability of botnet detection using adaptive traffic sampling. Proc. 6th ACM Symp. on Information, Computer and Communications Security, p.124–134.
-
(2011)
Proc. 6th ACM Symp. on Information, Computer and Communications Securit
, pp. 124-134
-
-
Zhang, J.1
Luo, X.2
Perdisci, R.3
-
211
-
-
80051935855
-
Detecting stealthy P2P botnets using statistical traffic fingerprints
-
Zhang, J., Perdisci, R., Lee, W., et al., 2011b. Detecting stealthy P2P botnets using statistical traffic fingerprints. IEEE/IFIP 41st Int. Conf. on Dependable Systems & Networks, p.121–132.
-
(2011)
IEEE/IFIP 41st Int. Conf. on Dependable Systems & Network
, pp. 121-132
-
-
Zhang, J.1
Perdisci, R.2
Lee, W.3
-
212
-
-
84872116111
-
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service
-
Zhao, S., Lee, P.P., Lui, J., et al., 2012. Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. Proc. 28th Annual Computer Security Applications Conf., p.119–128.
-
(2012)
Proc. 28th Annual Computer Security Applications Conf
, pp. 119-128
-
-
Zhao, S.1
Lee, P.P.2
Lui, J.3
-
213
-
-
79954733367
-
BotGraph: large scale spamming botnet detection
-
Zhao, Y., Xie, Y., Yu, F., et al., 2009. BotGraph: large scale spamming botnet detection. NSDI, 9:321–334.
-
(2009)
NSD
, vol.9
, pp. 321-334
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
-
214
-
-
34247237863
-
P2P traffic identification by TCP flow analysis
-
Zhou, L., Li, Z., Liu, B., 2006. P2P traffic identification by TCP flow analysis. IEEE Int. Workshop on Networking, Architecture, and Storages, p.2.
-
(2006)
IEEE Int. Workshop on Networking, Architecture, and Storage
, pp. 2
-
-
Zhou, L.1
Li, Z.2
Liu, B.3
-
215
-
-
77649329707
-
Botnet research survey
-
Zhu, Z., Lu, G., Chen, Y., et al., 2008. Botnet research survey. 32nd Annual IEEE Int. Computer Software and Applications, p.967–972.
-
(2008)
32nd Annual IEEE Int. Computer Software and Application
, pp. 967-972
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
-
216
-
-
85084095135
-
Characterizing botnets from email spam records
-
Zhuang, L., Dunagan, J., Simon, D.R., et al., 2008. Characterizing botnets from email spam records. Proc. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats LEET, Article 2, p.1–9.
-
(2008)
Proc. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats LEET, Article
, pp. 1-9
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.R.3
|