-
1
-
-
35948992902
-
Attack of the Zombie Computers is a Growing Threat, Experts Say
-
January
-
J. Markoff, “Attack of the Zombie Computers is a Growing Threat, Experts Say,” New York Times, January 2007.
-
(2007)
New York Times
-
-
Markoff, J.1
-
2
-
-
85093856006
-
Security Matters: Beware the Enemy Within
-
February
-
I. Cook, “Security Matters: Beware the Enemy Within,” Financial Times, February 2007.
-
(2007)
Financial Times
-
-
Cook, I.1
-
4
-
-
31844441529
-
-
January March, 2005
-
A. Gostev, “Malware Evolution: January - March, 2005,” http://www.viruslist.com, 2005.
-
(2005)
Malware Evolution
-
-
Gostev, A.1
-
5
-
-
48349083702
-
Bots Slim Down to get Tough
-
CNET News.com, November
-
D. Kawamoto, “Bots Slim Down to get Tough,” CNET News.com, November 2005.
-
(2005)
-
-
Kawamoto, D.1
-
6
-
-
85093873787
-
Dutch Police Nab Suspected Bot Herders
-
October
-
J. Evers, “Dutch Police Nab Suspected Bot Herders,” CNET News.com, October 2005.
-
(2005)
CNET News.com
-
-
Evers, J.1
-
8
-
-
85093875795
-
California Man Charged in Botnet Attacks
-
November
-
“California Man Charged in Botnet Attacks,” Reuters, November 2005.
-
(2005)
Reuters
-
-
-
15
-
-
84882582017
-
-
Springer
-
P. Barford and V. Yegneswaran, An Inside Look at Botnets, ser. Advances in Information Security, Malware Detection. Springer, 2007, vol. 27.
-
(2007)
An Inside Look at Botnets, ser. Advances in Information Security, Malware Detection
, vol.27
-
-
Barford, P.1
Yegneswaran, V.2
-
17
-
-
84891429894
-
Modeling Botnet Propagation Using Time Zones
-
San Diego, CA, February
-
D. Dagon, C. Zou, and W. Lee, “Modeling Botnet Propagation Using Time Zones,” in Proceedings of The Network and Distributed Systems Security Symposium (NDSS'06), San Diego, CA, February 2006.
-
(2006)
Proceedings of The Network and Distributed Systems Security Symposium (NDSS'06)
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
18
-
-
77952717608
-
Revealing Botnet Membership Using DNSBL Counter-Intelligence
-
San Jose, CA, July
-
A. Ramachandran, N. Feamster, and D. Dagon, “Revealing Botnet Membership Using DNSBL Counter-Intelligence,” in Proceedings of The USENIX Workshop on Steps to Reducing Unwanted Traffic in the Internet (SRUTI'06), San Jose, CA, July 2006.
-
(2006)
Proceedings of The USENIX Workshop on Steps to Reducing Unwanted Traffic in the Internet (SRUTI'06)
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
19
-
-
85081770459
-
The Internet Motion Sensor: A Distributed Blackhole Monitoring System
-
San Diego, CA, January
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, “The Internet Motion Sensor: A Distributed Blackhole Monitoring System,” in Proceedings of The Network and Distributed Security Symposium (NDSS'05), San Diego, CA, January 2005.
-
(2005)
Proceedings of The Network and Distributed Security Symposium (NDSS'05)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
20
-
-
14944341848
-
On the Design and Use of Internet Sinks for Network Abuse Monitoring
-
Sophia, France, September
-
V. Yegneswaran, P. Barford, and D. Plonka, “On the Design and Use of Internet Sinks for Network Abuse Monitoring,” in Proceedings of Recent Advances on Intrusion Detection (RAID'04), Sophia, France, September 2004.
-
(2004)
Proceedings of Recent Advances on Intrusion Detection (RAID'04)
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
21
-
-
14944369649
-
Characteristics of internet background radiation
-
Taormina, Italy, October
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson, “Characteristics of internet background radiation,” in Proceedings of ACM Internet Measurement Conference (IMC'04), Taormina, Italy, October 2004.
-
(2004)
Proceedings of ACM Internet Measurement Conference (IMC'04)
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
23
-
-
33750376717
-
Scalability, fidelity and containment in the potemkin virtual honeyfarm
-
Brighton, England, October
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. Snoeren, G. Voelker, and S. Savage, “Scalability, fidelity and containment in the potemkin virtual honeyfarm,” in Proceedings of ACM Symposium on Operating Systems Principles (SOSP'05), Brighton, England, October 2005.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP'05)
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.6
Voelker, G.7
Savage, S.8
-
24
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rio de Janerio, Brazil, November
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “A multifaceted approach to understanding the botnet phenomenon,” in Proceedings of ACM Internet Measurement Conference, Rio de Janerio, Brazil, November 2006.
-
(2006)
Proceedings of ACM Internet Measurement Conference
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
26
-
-
84888402098
-
The zombie roundup: Understanding, detecting and disrupting botnets
-
Cambridge, MA, July
-
E. Cooke, F. Jahanian, and D. McPherson, “The zombie roundup: Understanding, detecting and disrupting botnets,” in Proceedings of Usenix Workshop on Stepts to Reducing Unwanted Traffic on the Internet (SRUTI'05), Cambridge, MA, July 2005.
-
(2005)
Proceedings of Usenix Workshop on Stepts to Reducing Unwanted Traffic on the Internet (SRUTI'05)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
28
-
-
85093822939
-
Fighting Coordinated Attackers with Cross-Organizational Information Sharing
-
Irvine, CA, November
-
M. Allman, E. Blanton, V. Paxson, and S. Shenker, “Fighting Coordinated Attackers with Cross-Organizational Information Sharing,” in Proceedings of The Fifth Workshop on Hot Topics in Networks (HotNets '06), Irvine, CA, November 2004.
-
(2004)
Proceedings of The Fifth Workshop on Hot Topics in Networks (HotNets '06)
-
-
Allman, M.1
Blanton, E.2
Paxson, V.3
Shenker, S.4
-
33
-
-
84882593132
-
-
Coverity
-
Coverity, “Coverity Prevent,” http://www.coverity.com, 2005.
-
(2005)
Coverity Prevent
-
-
-
34
-
-
84885663355
-
-
P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Mine, D. Monniaux, and X. Rival, “The Astree Static Analyzer,” http://www.astree.ens.fr, 2005.
-
(2005)
The Astree Static Analyzer
-
-
Cousot, P.1
Cousot, R.2
Feret, J.3
Mauborgne, L.4
Mine, A.5
Monniaux, D.6
Rival, X.7
-
35
-
-
14944358991
-
Preliminary results using scale-down to explore worm dynamics
-
Washington D.C., October
-
N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson, “Preliminary results using scale-down to explore worm dynamics,” in Proceedings of ACM Workshop on Rapid Malcode (WORM'04), Washington D.C., October 2004.
-
(2004)
Proceedings of ACM Workshop on Rapid Malcode (WORM'04)
-
-
Weaver, N.1
Hamadeh, I.2
Kesidis, G.3
Paxson, V.4
-
36
-
-
84867737409
-
-
“The Norman Sandbox,” http://sandbox.norman.no, 2007.
-
(2007)
The Norman Sandbox
-
-
-
37
-
-
85093856109
-
-
“The Sunbelt CWSandbox,” http://www.sunbelt-software.com/SunbeltCWSandbox.cfm, 2007.
-
(2007)
The Sunbelt CWSandbox
-
-
-
38
-
-
48349123170
-
Attacks on Virtual Machines
-
Auckland, NZ, December
-
P. Ferrie, “Attacks on Virtual Machines,” in Proceedings of AVAR Conference'06, Auckland, NZ, December 2006.
-
(2006)
Proceedings of AVAR Conference'06
-
-
Ferrie, P.1
-
39
-
-
85093874741
-
-
“Offensive Computing,” http://www.offensivecomputing.net, 2007.
-
(2007)
Offensive Computing
-
-
-
41
-
-
85093826006
-
Internet Relay Chat: Client Protocol
-
April
-
C. Kalt, “Internet Relay Chat: Client Protocol,” RFC 2812 (Informational), April 2007.
-
(2007)
RFC 2812 (Informational)
-
-
Kalt, C.1
-
42
-
-
85093828523
-
-
“IRCD-Hybrid,” http://ircd-hybrid.com, 2007.
-
(2007)
IRCD-Hybrid
-
-
-
44
-
-
0003509661
-
Address Allocation for Private Internets
-
February
-
Y. Rekhter, B. Moskowitz, D. Karrenberg, G. de Groot, and E. Lear, “Address Allocation for Private Internets,” Internet RFC 1918, February 1996.
-
(1996)
Internet RFC 1918
-
-
Rekhter, Y.1
Moskowitz, B.2
Karrenberg, D.3
de Groot, G.4
Lear, E.5
-
45
-
-
33646920358
-
Scalable Network Path Emulation
-
San Diego, CA, September
-
S. Agarwal, J. Sommers, and P. Barford, “Scalable Network Path Emulation,” in Proceedings of The IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'05), San Diego, CA, September 2005.
-
(2005)
Proceedings of The IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'05)
-
-
Agarwal, S.1
Sommers, J.2
Barford, P.3
|