Using Failure Information Analysis to Detect Enterprise Zombies
暂无分享,去创建一个
[1] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[2] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[3] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[4] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[5] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] George Varghese,et al. Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.
[7] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[8] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[9] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[10] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[11] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[12] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[13] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[14] Duane Wessels,et al. Passive Monitoring of DNS Anomalies , 2007, DIMVA.
[15] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[16] John Aycock,et al. Army of Botnets , 2007, NDSS.
[17] Hervé Debar. An Introduction to Intrusion-Detection Systems , 2000 .
[18] Vinod Yegneswaran,et al. Characteristics of internet background radiation , 2004, IMC '04.
[19] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[20] P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis , 1987 .
[21] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[22] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[23] Ranveer Chandra,et al. What's going on?: learning communication rules in edge networks , 2008, SIGCOMM '08.
[24] Jason Lee,et al. A first look at modern enterprise traffic , 2005, IMC '05.
[25] Steven Gianvecchio,et al. Measurement and Classification of Humans and Bots in Internet Chat , 2008, USENIX Security Symposium.
[26] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[27] Paul Barford,et al. Context-aware clustering of DNS query traffic , 2008, IMC '08.