-
1
-
-
26844548971
-
-
Technical report, The Honeynet Project, Aug
-
P. Bächer, T. Holz, M. Kötter, and G. Wicherski. Know Your Enemy: Tracking Botnets. Technical report, The Honeynet Project, Aug. 2008.
-
(2008)
Know Your Enemy: Tracking Botnets
-
-
Bächer, P.1
Holz, T.2
Kötter, M.3
Wicherski, G.4
-
2
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
Aug
-
M. Barbaro and T. Zeller. A face is exposed for AOL searcher no. 4417749. The New York Times, Aug. 2006. http://www.nytimes.com/2006/08/09/technology/09aol.html.
-
(2006)
The New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
4
-
-
85080572052
-
-
CAIDA. http://www.caida.org/.
-
CAIDA
-
-
-
8
-
-
85080526776
-
-
Cyber-TA. http://cyber-ta.org/.
-
-
-
-
9
-
-
84910684721
-
Satellitelab: Adding heterogeneity to planetary-scale network testbeds
-
Aug
-
M. Dischinger, A. Haeberlen, I. Beschastnikh, K. P. Gummadi, and S. Saroiu. SatelliteLab: Adding heterogeneity to planetary-scale network testbeds. In ACM SIGCOMM Conference, Aug 2008.
-
(2008)
ACM SIGCOMM Conference
-
-
Dischinger, M.1
Haeberlen, A.2
Beschastnikh, I.3
Gummadi, K.P.4
Saroiu, S.5
-
12
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
Nov
-
B. S. Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: Analysis of a botnet takeover. In 16th ACM conference on Computer and Communications Security (CCS), Nov. 2009.
-
(2009)
16th ACM Conference on Computer and Communications Security (CCS)
-
-
Gross, B.S.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
13
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
July
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In 17th USENIX Security Symposium, July 2008.
-
(2008)
17th USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
14
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
Aug
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In 16th USENIX Security Symposium, Aug. 2007.
-
(2007)
16th USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
16
-
-
85084097128
-
Measurements and mitigation of Peer-to-Peer-based botnets: A case study on storm worm
-
Apr
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Apr. 2008.
-
(2008)
1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
17
-
-
85080525602
-
-
Honey@home. http://www.honeyathome.org/.
-
Honey@Home
-
-
-
19
-
-
85084096724
-
The heisenbot uncertainty problem: Challenges in separating bots from chaff
-
Apr
-
C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. In 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Apr. 2008.
-
(2008)
1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kanich, C.1
Levchenko, K.2
Enright, B.3
Voelker, G.M.4
Savage, S.5
-
22
-
-
78651469705
-
-
PhD thesis, Georgia Institute of Technology, Atlanta, Georgia, May
-
C. P. Lee. Framework for Botnet Emulation and Analysis. PhD thesis, Georgia Institute of Technology, Atlanta, Georgia, May 2009.
-
(2009)
Framework for Botnet Emulation and Analysis
-
-
Lee, C.P.1
-
24
-
-
78751649445
-
Clustering botnet communication traffic based on n-gram feature selection
-
Mar
-
W. Lu, G. Rammidi, and A. A. Ghorbani. Clustering botnet communication traffic based on n-gram feature selection. Computer Communications, 34(3):502–514, Mar. 2011.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 502-514
-
-
Lu, W.1
Rammidi, G.2
Ghorbani, A.A.3
-
28
-
-
85059753615
-
BotGrep: Finding P2P bots with structured graph analysis
-
Aug
-
S. Nagaraja, P. Mittal, C. Y. Hong, M. Caesar, and N. Borisov. BotGrep: Finding P2P Bots with Structured Graph Analysis. In USENIX Security Symposium, Aug. 2010.
-
(2010)
USENIX Security Symposium
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.Y.3
Caesar, M.4
Borisov, N.5
-
33
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
Apr
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots), Apr. 2007.
-
(2007)
1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
35
-
-
77952356233
-
Differential privacy for collaborative security
-
Apr
-
J. Reed, A. J. Aviv, D. Wagner, A. Haeberlen, B. C. Pierce, and J. M. Smith. Differential privacy for collaborative security. In 3rd European Workshop on System Security (EuroSec), Apr. 2010.
-
(2010)
3rd European Workshop on System Security (EuroSec)
-
-
Reed, J.1
Aviv, A.J.2
Wagner, D.3
Haeberlen, A.4
Pierce, B.C.5
Smith, J.M.6
-
36
-
-
77954740531
-
Botzilla: Detecting the”phoning home” of malicious software
-
Mar
-
K. Rieck, G. Schwenk, T. Limmer, T. Holz, and P. Laskov. Botzilla: Detecting the”phoning home” of malicious software. In 25th ACM Symposium on Applied Computing (SAC), Mar. 2010.
-
(2010)
25th ACM Symposium on Applied Computing (SAC)
-
-
Rieck, K.1
Schwenk, G.2
Limmer, T.3
Holz, T.4
Laskov, P.5
-
37
-
-
84903516313
-
-
Shadowserver. http://shadowserver.org/.
-
Shadowserver
-
-
-
38
-
-
33845215790
-
Using PlanetLab for network research: Myths, realities, and best practices
-
Jan
-
N. Spring, L. Peterson, A. Bavier, and V. Pai. Using PlanetLab for network research: myths, realities, and best practices. SIGOPS Operating Systems Review, 40(1):17–24, Jan. 2006.
-
(2006)
SIGOPS Operating Systems Review
, vol.40
, Issue.1
, pp. 17-24
-
-
Spring, N.1
Peterson, L.2
Bavier, A.3
Pai, V.4
-
42
-
-
67650145176
-
Swing: Realistic and responsive network traffic generation
-
June
-
K. V. Vishwanath and A. Vahdat. Swing: Realistic and responsive network traffic generation. IEEE/ACM Transactions on Networking, 17(3):712–725, June 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.3
, pp. 712-725
-
-
Vishwanath, K.V.1
Vahdat, A.2
-
43
-
-
85080506984
-
-
VX Heavens. http://vx.netlux.org/.
-
VX Heavens
-
-
-
44
-
-
33746144908
-
TMIX: A tool for generating realistic TCP application workloads in ns-2
-
July
-
M. C. Weigle, P. Adurthi, F. Hernández-Campos, K. Jeffay, and F. D. Smith. Tmix: a tool for generating realistic tcp application workloads in ns-2. SIGCOMM Computer Communication Review, 36:65–76, July 2006.
-
(2006)
SIGCOMM Computer Communication Review
, vol.36
, pp. 65-76
-
-
Weigle, M.C.1
Adurthi, P.2
Hernández-Campos, F.3
Jeffay, K.4
Smith, F.D.5
-
45
-
-
78650896043
-
Automatically generating models for botnet detection
-
Sept
-
P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, and E. Kirda. Automatically Generating Models for Botnet Detection. In 14th European Symposium on Research in Computer Security (ESORICS). Sept. 2009.
-
(2009)
14th European Symposium on Research in Computer Security (ESORICS)
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Goebel, J.4
Kruegel, C.5
Kirda, E.6
-
49
-
-
79956014847
-
Boosting the scalability of botnet detection using adaptive traffic sampling
-
Mar
-
U. Zhang, X. Luo, R. Perdisci, G. Gu, W. Lee, and N. Feamster. Boosting the scalability of botnet detection using adaptive traffic sampling. In 6th ACM Symposium on Information, Computer and Communcations Security (ASIACCS), Mar. 2011.
-
(2011)
6th ACM Symposium on Information, Computer and Communcations Security (ASIACCS)
-
-
Zhang, U.1
Luo, X.2
Perdisci, R.3
Gu, G.4
Lee, W.5
Feamster, N.6
|