-
3
-
-
85076720227
-
-
Koobface. http://blog.threatexpert.com/2008/12/koobface- leaves- victims- black- spot.html.
-
Koobface
-
-
-
6
-
-
85076758960
-
-
Snort IDS. http://www.snort.org.
-
-
-
-
8
-
-
84905682757
-
-
Zeus Tracker. https://zeustracker.abuse.ch/faq. php.
-
Zeus Tracker
-
-
-
9
-
-
58149084148
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In Recent Advances in Intrusion Detection, 2007.
-
(2007)
Recent Advances in Intrusion Detection
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
10
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Milani Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Network and Distributed System Security Symposium, 2009.
-
(2009)
Network and Distributed System Security Symposium
-
-
Bayer, U.1
Milani Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
11
-
-
77954996346
-
Automatically identifying trigger-based behavior in malware
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Automatically identifying trigger-based behavior in malware. Botnet Detection, 2008.
-
(2008)
Botnet Detection
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
15
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In USENIX Security, 2008.
-
(2008)
USENIX Security
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
17
-
-
0035676057
-
On clustering validation techniques
-
M. Halkidi, Y. Batistakis, and M. Vazirgiannis. On clustering validation techniques. J. Intell. Inf. Syst., 17(2-3):107-145, 2001.
-
(2001)
J. Intell. Inf. Syst.
, vol.17
, Issue.2-3
, pp. 107-145
-
-
Halkidi, M.1
Batistakis, Y.2
Vazirgiannis, M.3
-
19
-
-
84893405732
-
Data clustering: A review
-
A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: a review. ACM Comput. Surv., 31(3):264-323, 1999.
-
(1999)
ACM Comput. Surv.
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
21
-
-
85077680022
-
Behavior-based spyware detection
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. A. Kemmerer. Behavior-based spyware detection. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.A.5
-
23
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphicworms with provable attack resilience
-
Z. Liand, M. Sanghi, Y. Chen, M. Kao, and B. Chavez. Hamsa: Fast signature generation for zero-day polymorphicworms with provable attack resilience. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Liand, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.4
Chavez, B.5
-
28
-
-
33751051489
-
Misleadingworm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleadingworm signature generators using deliberate noise injection. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
32
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: signatures and characteristics. In ACM SIGCOMM conference on data communication, 2008.
-
(2008)
ACM SIGCOMM Conference on Data Communication
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
34
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In ACM Conference on Computer and Communications Security, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|