-
3
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. Building a dynamic reputation system for DNS. In the Proceedings of 19th USENIX Security Symposium (USENIX Security’10), 2010.
-
(2010)
The Proceedings of 19th USENIX Security Symposium (USENIX Security’10)
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
4
-
-
85068675731
-
Detecting malware domains in the upper DNS hierarchy
-
M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, and D. Dagon. Detecting malware domains in the upper DNS hierarchy. In the Proceedings of 20th USENIX Security Symposium (USENIX Security’11), 2011.
-
(2011)
The Proceedings of 20th USENIX Security Symposium (USENIX Security’11)
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Vasiloglou, N.4
Dagon, D.5
-
5
-
-
85076212585
-
-
BankPatch. Trojan.Bankpatch.C. http://www.symantec.com/security_ response/writeup.jsp?docid= 2008-081817-1808-99&tabid=2, 2009.
-
(2009)
Trojan.Bankpatch.C
-
-
-
8
-
-
85076199411
-
-
R. Finones. Virus:Win32/Expiro.Z. http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx? Name=Virus%3AWin32%2FExpiro.Z, 2011.
-
(2011)
Virus:Win32/Expiro.Z.
-
-
Finones, R.1
-
10
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting malware infection through IDS-driven dialog correlation. In Proc. USENIX Security, 2007.
-
(2007)
Proc. USENIX Security
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
13
-
-
85075837457
-
Bot-Miner: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Bot-Miner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In USENIX Security, 2008.
-
(2008)
USENIX Security
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
16
-
-
85084096530
-
Dns prefetching and its privacy implications: When good things go bad
-
Berkeley, CA, USA, USENIX Association
-
S. Krishnan and F. Monrose. Dns prefetching and its privacy implications: when good things go bad. In Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, LEET’10, pages 10–10, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET’10
, pp. 10
-
-
Krishnan, S.1
Monrose, F.2
-
24
-
-
0001820920
-
X-means: Extending k-means with efficient estimation of the number of clusters
-
San Francisco, CA, USA, Morgan Kaufmann Publishers Inc
-
D. Pelleg and A. W. Moore. X-means: Extending k-means with efficient estimation of the number of clusters. In Proceedings of the Seventeenth International Conference on Machine Learning, ICML ’00, pages 727–734, San Francisco, CA, USA, 2000. Morgan Kaufmann Publishers Inc.
-
(2000)
Proceedings of the Seventeenth International Conference on Machine Learning, ICML ’00
, pp. 727-734
-
-
Pelleg, D.1
Moore, A.W.2
-
26
-
-
70349682715
-
Inside risks: Reflections on conficker
-
October
-
P. Porras. Inside risks: Reflections on conficker. Communications of the ACM, 52:23–24, October 2009.
-
(2009)
Communications of the ACM
, vol.52
, pp. 23-24
-
-
Porras, P.1
-
27
-
-
77956435872
-
-
Technical report, SRI International, Menlo Park, CA, April
-
P. Porras, H. Saidi, and V. Yegneswaran. Conficker C analysis. Technical report, SRI International, Menlo Park, CA, April 2009.
-
(2009)
Conficker C Analysis
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
32
-
-
85076207392
-
-
SOPHOS. Mal/Simda-C. http://www.sophos.com/en-us/ threat-center/threat-analyses/ viruses-and-spyware/MalSimda-C/ detailed-analysis.aspx, 2012.
-
(2012)
Mal/Simda-C
-
-
-
34
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
New York, NY, USA, ACM
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS’09, pages 635–647, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS’09
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
35
-
-
49049107082
-
Analysis of the storm and nugache trojans: P2p is here
-
December
-
S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the storm and nugache trojans: P2P is here. In USENIX;login:, vol. 32, no. 6, December 2007.
-
(2007)
USENIX;Login
, vol.32
, Issue.6
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
36
-
-
77955861102
-
Are your hosts trading or plotting? Telling P2P file-sharing and bots apart
-
T.-F. Yen and M. K. Reiter. Are your hosts trading or plotting? Telling P2P file-sharing and bots apart. In ICDCS, 2010.
-
(2010)
ICDCS
-
-
Yen, T.-F.1
Reiter, M.K.2
-
38
-
-
85052027011
-
-
Wikipedia. The storm botnet. http://en.wikipedia.org/wiki/Storm_botnet, 2010.
-
(2010)
The Storm Botnet
-
-
-
41
-
-
85076214483
-
-
J. Wong. Trojan:Java/Boonana. http://www.microsoft.com/security/ portal/Threat/Encyclopedia/Entry. aspx?Name=Trojan%3AJava%2FBoonana, 2011.
-
(2011)
Trojan:Java/Boonana
-
-
Wong, J.1
-
42
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
New York, NY, USA, ACM
-
S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan. Detecting algorithmically generated malicious domain names. In Proceedings of the 10th annual Conference on Internet Measurement, IMC’10, pages 48–61, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement, IMC’10
, pp. 48-61
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.N.3
Ranjan, S.4
-
46
-
-
80051935855
-
Detecting stealthy P2P botnets using statistical traffic fingerprints
-
J. Zhang, R. Perdisci, W. Lee, U. Sarfraz, and X. Luo. Detecting stealthy P2P botnets using statistical traffic fingerprints. In Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Dependable Computing and Communication Symposium, 2011.
-
(2011)
Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Dependable Computing and Communication Symposium
-
-
Zhang, J.1
Perdisci, R.2
Lee, W.3
Sarfraz, U.4
Luo, X.5
|