메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Insights from the inside: A view of botnet management from infiltration

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURE; COMPUTER VIRUSES; PERSONAL COMPUTING; REVERSE ENGINEERING;

EID: 85084097075     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (62)

References (16)
  • 1
    • 85075102401 scopus 로고    scopus 로고
    • Botnetweb. http://blog.fireeye.com/research/2009/04/botnetweb.htm.
  • 3
    • 85075111080 scopus 로고    scopus 로고
    • Mega-d. http://www.m86security.com/trace/i/ Mega- D, spambot.896.asp.
    • Mega-D
  • 6
    • 85075102905 scopus 로고    scopus 로고
    • Tracking spam botnets. http://www.m86security.com/labs/bot_statistics.asp.
    • Tracking Spam Botnets
  • 8
    • 70449745098 scopus 로고    scopus 로고
    • The heisenbot uncertainty problem: Challenges in separating bots from chaff
    • Chris Kanich et al. The Heisenbot uncertainty problem: Challenges in separating bots from chaff. In Proc. LEET, 2008.
    • (2008) Proc. LEET
    • Kanich, C.1
  • 9
    • 70349272437 scopus 로고    scopus 로고
    • Spamalytics: An empirical analysis of spam marketing conversion
    • October
    • Chris Kanich et al. Spamalytics: An empirical analysis of spam marketing conversion. In ACM CCS, October 2008.
    • (2008) ACM CCS
    • Kanich, C.1
  • 10
    • 84555220110 scopus 로고    scopus 로고
    • Spamcraft: An inside look at spam campaign orchestration
    • Christian Kreibich et al. Spamcraft: An inside look at spam campaign orchestration. In Proc. LEET, 2009.
    • (2009) Proc. LEET
    • Kreibich, C.1
  • 11
    • 74049095923 scopus 로고    scopus 로고
    • Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
    • Juan Caballero et al. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In ACM CCS, 2009.
    • (2009) ACM CCS
    • Caballero, J.1
  • 12
    • 83455215100 scopus 로고    scopus 로고
    • Binary code extraction and interface identification for security applications
    • February
    • Juan Caballero et al. Binary code extraction and interface identification for security applications. In Proc. NDSS, February 2010.
    • (2010) Proc. NDSS
    • Caballero, J.1
  • 13
    • 85084097128 scopus 로고    scopus 로고
    • Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
    • Thorsten Holz et al. Measurements and mitigation of peer-to-peer-based botnets: A case study on Storm worm. In Proc. LEET, 2008.
    • (2008) Proc. LEET
    • Holz, T.1
  • 15
    • 85075106659 scopus 로고    scopus 로고
    • Personal communication, March
    • Atif Mushtaq. Personal communication, March 2010.
    • (2010)
    • Mushtaq, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.