Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
暂无分享,去创建一个
Dave Levin | Richard Roberts | Stephen Herwig | Katura Harvey | George Hughey | Dave Levin | Richard Roberts | Katura Harvey | Stephen Herwig | George Hughey
[1] Kensuke Fukuda,et al. Detecting Malicious Activity with DNS Backscatter , 2015, Internet Measurement Conference.
[2] Anja Feldmann,et al. A Multi-perspective Analysis of Carrier-Grade NAT Deployment , 2016, Internet Measurement Conference.
[3] Chris Kanich,et al. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff , 2008, LEET.
[4] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.
[5] Nick Feamster,et al. Peeking behind the NAT: an empirical study of home networks , 2013, Internet Measurement Conference.
[6] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[7] Dawn Xiaodong Song,et al. Insights from the Inside: A View of Botnet Management from Infiltration , 2010, LEET.
[8] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[9] Elaine Shi,et al. Portcullis: protecting connection setup from denial-of-capability attacks , 2007, SIGCOMM '07.
[10] Herbert Bos,et al. SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[12] J. Alex Halderman,et al. A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.
[13] Helen J. Wang,et al. Characterizing Botnets from Email Spam Records , 2008, LEET.
[14] Yongdae Kim,et al. Towards complete node enumeration in a peer-to-peer botnet , 2009, ASIACCS '09.
[15] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[16] Thomas E. Anderson,et al. Phalanx: Withstanding Multimillion-Node Botnets , 2008, NSDI.
[17] Andreas Terzis,et al. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.
[18] Kimberly C. Claffy,et al. Reasons Dynamic Addresses Change , 2016, Internet Measurement Conference.
[19] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[20] Bohn Stafleu van Loghum,et al. Online … , 2002, LOG IN.
[21] Xiaowei Yang,et al. TVA: A DoS-Limiting Network Architecture , 2008, IEEE/ACM Transactions on Networking.
[22] Miguel Castro,et al. Defending against eclipse attacks on overlay networks , 2004, EW 11.
[23] Farnam Jahanian,et al. A Survey of Botnet Technology and Defenses , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[24] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[25] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[26] Felix C. Freiling,et al. Walowdac - Analysis of a Peer-to-Peer Botnet , 2009, 2009 European Conference on Computer Network Defense.