-
3
-
-
34547141391
-
The nepenthes platform: An efficient approach to collect malware
-
Hamburg, September
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling. The nepenthes platform: An efficient approach to collect malware. In Proceedings of Recent Advances in Intrusion Detection, Hamburg, September 2006.
-
(2006)
Proceedings of Recent Advances in Intrusion Detection
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
4
-
-
58149084148
-
Automated classification and analysis of internetmalware
-
M. Bailey, J. Oberheide, J. Andersen, M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internetmalware. In Proceedings of Recent Advances in Intrusion Detection (RAID’07), 2007.
-
(2007)
Proceedings of Recent Advances in Intrusion Detection (RAID’07)
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, M.4
Jahanian, F.5
Nazario, J.6
-
8
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
M. Collins, T. Shimeall, S. Faber, J. Janies, R.Weaver, M. D. Shon, and J. Kadane. Using uncleanliness to predict future botnet addresses,. In Proceedings of the 2007 Internet MeasurementConference (IMC’07), 2007.
-
(2007)
Proceedings of the 2007 Internet MeasurementConference (IMC’07)
-
-
Collins, M.1
Shimeall, T.2
Faber, S.3
Janies, J.4
Weaver, R.5
Shon, M. D.6
Kadane, J.7
-
9
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D.McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of Workshop on Steps to Re- ducing Unwanted Traffic on the Internet (SRUTI’05), 2005.
-
(2005)
Proceedings of Workshop on Steps to Re- ducing Unwanted Traffic on the Internet (SRUTI’05)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
14
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: Overview and case study. In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots’07), 2007.
-
(2007)
USENIX Workshop on Hot Topics in Understanding Botnets (HotBots’07)
-
-
Grizzard, J. B.1
Sharma, V.2
Nunnery, C.3
Kang, B. B.4
Dagon, D.5
-
15
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In 16th USENIX Security Symposium (Security’07), 2007.
-
(2007)
16th USENIX Security Symposium (Security’07)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
17
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A.W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy 2004, Oakland, CA, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
22
-
-
34547399387
-
A multi-faceted approach to understanding the botnet phenomenon
-
Brazil, October
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multi-faceted approach to understanding the botnet phenomenon. In Proceedings of ACM SIG-COMM/USENIX Internet Measurement Conference, Brazil, October 2006.
-
(2006)
Proceedings of ACM SIG-COMM/USENIX Internet Measurement Conference
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
24
-
-
85090433665
-
Snort - lightweight intrusion detection for networks
-
M. Roesch. Snort - lightweight intrusion detection for networks. In Proceedings of USENIX LISA’99, 1999.
-
(1999)
Proceedings of USENIX LISA’99
-
-
Roesch, M.1
-
28
-
-
34249899090
-
Analyzing worms and network traffic using compression
-
S. Wehner. Analyzing worms and network traffic using compression. Journal of Computer Security, 15(3):303-320, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 303-320
-
-
Wehner, S.1
-
30
-
-
69849109516
-
Using honeynets for internet situational awareness
-
College Park, MD, November
-
V. Yegneswaran, P. Barford, and V. Paxson. Using honeynets for internet situational awareness. In Pro- ceedings of the Fourth Workshop on Hot Topics in Networks (HotNets IV), College Park, MD, November 2005.
-
(2005)
Pro- ceedings of the Fourth Workshop on Hot Topics in Networks (HotNets IV)
-
-
Yegneswaran, V.1
Barford, P.2
Paxson, V.3
-
31
-
-
61649123904
-
-
Peking University & University of Mannheim Technical Report
-
J. Zhuge, T. Holz, X. Han, J. Guo, and W. Zou. Characterizing the irc-based botnet phenomenon. Peking University & University of Mannheim Technical Report, 2007.
-
(2007)
Characterizing the irc-based botnet phenomenon
-
-
Zhuge, J.1
Holz, T.2
Han, X.3
Guo, J.4
Zou, W.5
|