-
1
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC '06, 2006.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
3
-
-
85068725031
-
Building a dynamic reputation system for dns
-
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. Building a Dynamic Reputation System for DNS. In the Proceedings of 19th USENIX Security Symposium (USENIX Security '10), 2010.
-
(2010)
The Proceedings of 19th USENIX Security Symposium (USENIX Security '10)
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
5
-
-
33846516584
-
-
Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
C. M. Bishop. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2006.
-
(2006)
Pattern Recognition and Machine Learning (Information Science and Statistics)
-
-
Bishop, C.M.1
-
6
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
New York, NY, USA, ACM.
-
M. P. Collins, T. J. Shimeall, S. Faber, J. Janies, R. Weaver, M. De Shon, and J. Kadane. Using uncleanliness to predict future botnet addresses. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, IMC '07, pages 93-104, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC '07
, pp. 93-104
-
-
Collins, M.P.1
Shimeall, T.J.2
Faber, S.3
Janies, J.4
Weaver, R.5
De Shon, M.6
Kadane, J.7
-
8
-
-
85076480644
-
-
dihe's IP-Index Browser
-
dihe's IP-Index Browser. DIHE. http://ipindex. homelinux.net/index.php, 2008.
-
(2008)
DIHE
-
-
-
9
-
-
85076501060
-
-
DNS Whitelist Protect against false positives. DNSWL
-
DNS Whitelist Protect against false positives. DNSWL. http://www.dnswl.org, 2008.
-
(2008)
-
-
-
12
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee. Polymorphic blending attacks. In In Proceedings of the 15 th USENIX Security Symposium, pages 241-256, 2006.
-
(2006)
Proceedings of the 15 Th USENIX Security Symposium
, pp. 241-256
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
14
-
-
0003684449
-
-
Springer Series in Statistics. Springer New York Inc., New York, NY, USA
-
T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning. Springer Series in Statistics. Springer New York Inc., New York, NY, USA, 2001.
-
(2001)
The Elements of Statistical Learning
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
15
-
-
0036805563
-
DNS performance and the effectiveness of caching
-
October
-
J. Jung, E. Sit, H. Balakrishnan, and R. Morris. DNS performance and the effectiveness of caching. IEEE/ACM Trans. Netw., 10:589-603, October 2002.
-
(2002)
IEEE/ACM Trans. Netw.
, vol.10
, pp. 589-603
-
-
Jung, J.1
Sit, E.2
Balakrishnan, H.3
Morris, R.4
-
20
-
-
70349682715
-
Inside risks: Reflections on conficker
-
October
-
P. Porras. Inside risks: Reflections on conficker. Commun. ACM, 52:23-24, October 2009.
-
(2009)
Commun. ACM
, vol.52
, pp. 23-24
-
-
Porras, P.1
-
21
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive DNS traces
-
Honolulu, Hawaii, USA
-
R. Perdisci, I. Corona, D. Dagon, and W. Lee. Detecting malicious flux service networks through passive analysis of recursive DNS traces. In Proceedings of ACSAC, Honolulu, Hawaii, USA, 2009.
-
(2009)
Proceedings of ACSAC
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
Lee, W.4
-
25
-
-
85084162258
-
How to own the internet in your spare time
-
Berkeley, CA, USA, USENIX Association.
-
S. Staniford, V. Paxson, and N. Weaver. How to own the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, pages 149-167, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
27
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
New York, NY, USA, ACM.
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: Analysis of a botnet takeover. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 635-647, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
28
-
-
84866519046
-
-
Team Cymru
-
Team Cymru. IP to ASN mapping. http: //www.team-cymru.org/Services/ ip-to-asn.html, 2008.
-
(2008)
IP to ASN Mapping
-
-
-
30
-
-
14944340861
-
Measurements and Laboratory Simulations of the Upper DNS Hierarchy
-
D. Wessels, M. Fomenkov, N. Brownlee, and K. Claffy. Measurements and Laboratory Simulations of the Upper DNS Hierarchy. In PAM, 2004.
-
(2004)
PAM
-
-
Wessels, D.1
Fomenkov, M.2
Brownlee, N.3
Claffy, K.4
|