Your botnet is my botnet: analysis of a botnet takeover
暂无分享,去创建一个
Christopher Krügel | Giovanni Vigna | Brett Stone-Gross | Richard A. Kemmerer | Lorenzo Cavallaro | Marco Cova | Martin Szydlowski | Bob Gilbert | Brett Stone-Gross | L. Cavallaro | Christopher Krügel | Giovanni Vigna | R. Kemmerer | M. Cova | M. Szydlowski | G. Vigna | Bob Gilbert
[1] Yongdae Kim,et al. Towards complete node enumeration in a peer-to-peer botnet , 2009, ASIACCS '09.
[2] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[3] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[4] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[5] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[6] Guofei Gu,et al. A Taxonomy of Botnet Structures , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[7] Hassen Saïdi,et al. A Foray into Conficker's Logic and Rendezvous Points , 2009, LEET.
[8] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[9] Chris Kanich,et al. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff , 2008, LEET.
[10] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[11] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[12] Stefan Saroiu,et al. Measurement and analysis of spywave in a university environment , 2004 .
[13] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[14] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[15] Felix C. Freiling,et al. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones , 2009, ESORICS.
[16] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[17] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[18] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[19] Helen J. Wang,et al. Characterizing Botnets from Email Spam Records , 2008, LEET.
[20] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[21] Stefan Saroiu,et al. Measurement and Analysis of Spyware in a University Environment , 2004, NSDI.
[22] Aaron J. Burstein. Conducting Cybersecurity Research Legally and Ethically , 2008, LEET.
[23] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[24] Andreas Terzis,et al. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.
[25] Chris Kanich,et al. On the Spam Campaign Trail , 2008, LEET.
[26] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.