Honeypot-Aware Advanced Botnet Construction and Maintenance
暂无分享,去创建一个
[1] Mary K. Vernon,et al. Mapping Internet Sensors with Probe Response Attacks , 2005, USENIX Security Symposium.
[2] Niels Provos,et al. A Hybrid Honeypot Architecture for Scalable Network Monitoring , 2004 .
[3] Xuxian Jiang,et al. Collapsar: A VM-Based Architecture for Network Attack Detention Center , 2004, USENIX Security Symposium.
[4] Raj K. Puri. Bots & Botnet: An Overview , 2003 .
[5] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[6] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[7] David M. Nicol,et al. Models of Active Worm Defenses , 2004 .
[8] Yakov Rekhter,et al. Dynamic Updates in the Domain Name System (DNS UPDATE) , 1997, RFC.
[9] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[10] Donald F. Towsley,et al. On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.
[11] Yong Tang,et al. Defending against Internet worms: a signature-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[12] Angelos D. Keromytis,et al. Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.
[13] Guofei Gu,et al. HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.
[14] Neal Krawetz,et al. Anti-honeypot technology , 2004, IEEE Security & Privacy Magazine.
[15] Henry L. Owen,et al. The use of Honeynets to detect exploited systems across large enterprise networks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[16] J. Crowcroft,et al. Using Packet Symmetry to Curtail Malicious Traffic , 2005 .
[17] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[18] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[19] Bill McCarty,et al. Botnets: Big and Bigger , 2003, IEEE Secur. Priv..
[20] George Kesidis,et al. Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms , 2005, QoS-IP.
[21] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[22] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[23] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.