Towards complete node enumeration in a peer-to-peer botnet
暂无分享,去创建一个
Yongdae Kim | Brent Byunghoon Kang | Nicholas Hopper | James Tyra | Eric Chan-Tin | David Dagon | Christopher P. Lee | Brent ByungHoon Kang | Hun Jeong Kang | Chris Nunnery | Zachariah Wadler | Greg Sinclair | Yongdae Kim | D. Dagon | Christopher P. Lee | Hun-Jeong Kang | J. Tyra | C. Nunnery | G. Sinclair | Nicholas Hopper | Eric Chan-Tin | Zachariah Wadler
[1] B. E. Eckbo,et al. Appendix , 1826, Epilepsy Research.
[2] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Sven Dietrich,et al. Analysis of the Storm and Nugache Trojans: P2P Is Here , 2007, login Usenix Mag..
[5] Daniel Stutzbach,et al. Improving Lookup Performance Over a Widely-Deployed DHT , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[7] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[8] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[9] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[10] Guofei Gu,et al. A Taxonomy of Botnet Structures , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[11] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[12] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[13] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[14] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[15] Chris Kanich,et al. Storm: When Researchers Collide , 2008, login Usenix Mag..
[16] Taoufik En-Najjary,et al. A global view of kad , 2007, IMC '07.
[17] Fang Yu,et al. How dynamic are IP addresses? , 2007, SIGCOMM '07.
[18] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[19] Chris Kanich,et al. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff , 2008, LEET.