-
1
-
-
34547141391
-
The nepenthes platform: An efficient approach to collect malware
-
P. Baecher, M. Koetter, T. Holz, F. Freiling, and M. Dornseif. The nepenthes platform: An efficient approach to collect malware. In Proceedings of 9th International Symposium On Recent Advances in Intrusion Detection (RAID’06), 2006.
-
(2006)
Proceedings of 9th International Symposium on Recent Advances in Intrusion Detection (RAID’06)
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Freiling, F.4
Dornseif, M.5
-
2
-
-
85075101869
-
Storm worm
-
October
-
J. Ballard. Storm Worm, October 2007. NANOG 41, http://www.nanog.org/mtg-0710/kristoff.html.
-
(2007)
NANOG 41
-
-
Ballard, J.1
-
4
-
-
33748932391
-
Dynamic analysis of malicious code
-
U. Bayer, A. Moser, C. Kruegel, and E. Kirda. Dynamic analysis of malicious code. Journal in Computer Virology, 2:67–77, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, pp. 67-77
-
-
Bayer, U.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
-
5
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
USENIX, June
-
E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI’05), pages 39–44. USENIX, June 2005.
-
(2005)
Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI’05)
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
7
-
-
84947273682
-
The sybil attack
-
Proceedings of the 1st International Workshop on Peer-to-Peer Systems IPTPS, March
-
st International Workshop on Peer-to-Peer Systems (IPTPS), LNCS, pages 251–260, March 2002.
-
(2002)
LNCS
, pp. 251-260
-
-
Douceur, J.R.1
-
8
-
-
85075109092
-
Exposing stormworm
-
October
-
B. Enright. Exposing Stormworm, October 2007. Toorcon 9, http://noh.ucsd.edu/~bmenrigh/.
-
(2007)
Toorcon 9
-
-
Enright, B.1
-
9
-
-
85032403022
-
-
February
-
Federal Bureau of Investigation (FBI). Operation Bot Roast, February 2007. http://www.fbi.gov/pressrel/pressrel07/botnet061307.htm.
-
(2007)
Operation Bot Roast
-
-
-
12
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: Overview and case study. In Proceedings of Hot Topics in Understanding Botnets (HotBots’07), 2007.
-
(2007)
Proceedings of Hot Topics in Understanding Botnets (HotBots’07)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
13
-
-
85075109510
-
-
Internet: September
-
L. Grossman. The worm that roared. Internet: http://www.time.com/time/magazine/, September 2007.
-
(2007)
The Worm That Roared
-
-
Grossman, L.1
-
14
-
-
45749156009
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium, 2006.
-
(2006)
Proceedings of the 16th USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
16
-
-
85075102159
-
-
KadC. http://kadc.sourceforge.net/.
-
-
-
-
18
-
-
85075111104
-
-
Maxmind. http://www.maxmind.com/.
-
-
-
-
20
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1(4):33–39, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
21
-
-
0141762461
-
Code-ReD: A case study on the spread and victims of an internet worm
-
New York, NY, USA, ACM Press
-
D. Moore, C. Shannon, and k claffy. Code-red: A case study on the spread and victims of an internet worm. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, pages 273–284, New York, NY, USA, 2002. ACM Press.
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
23
-
-
44649128920
-
-
Technical report, Computer Science Laboratory, SRI International, October
-
P. Porras, H. Saidi, and V. Yegneswaran. A Multi-perspective Analysis of the Storm (Peacomm) Worm. Technical report, Computer Science Laboratory, SRI International, October 2007.
-
(2007)
A Multi-Perspective Analysis of the Storm (Peacomm) Worm
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
25
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In Proceedings of 1st Workshop on Hot Topics in Understanding Botnets (HotBots’07), 2007.
-
(2007)
Proceedings of 1st Workshop on Hot Topics in Understanding Botnets (HotBots’07)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
26
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
Apr
-
A. Singh et al. Eclipse attacks on overlay networks: Threats and defenses. In Proc. Infocom 06, Apr. 2006.
-
(2006)
Proc. Infocom 06
-
-
Singh, A.1
-
28
-
-
77952321257
-
Load reduction in the kad peer-to-peer system
-
M. Steiner, W. Effelsberg, T. En-Najjary, and E. W. Biersack. Load reduction in the kad peer-to-peer system. In Fifth International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P 2007), 2007.
-
(2007)
Fifth International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P 2007)
-
-
Steiner, M.1
Effelsberg, W.2
En-Najjary, T.3
Biersack, E.W.4
-
30
-
-
70350241605
-
-
Internet
-
J. Stewart. Storm worm DDoS attack. Internet: http://www.secureworks.com/research/threats/ storm-worm, 2007.
-
(2007)
Storm Worm DDoS Attack
-
-
Stewart, J.1
-
31
-
-
33750356750
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
February
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS’06), February 2006.
-
(2006)
Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS’06)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
|