Spatial-Temporal Characteristics of Internet Malicious Sources
暂无分享,去创建一个
[1] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[2] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[3] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[4] Tal Garfinkel,et al. Opportunistic Measurement: Extracting Insight from Spurious Traffic , 2005 .
[5] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[6] Robert Beverly,et al. The spoofer project: inferring the extent of source address filtering on the internet , 2005 .
[7] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[8] David Moore,et al. The Spread of the Witty Worm , 2004, IEEE Secur. Priv..
[9] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[11] Chuanyi Ji,et al. Measuring Network-Aware Worm Spreading Ability , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.