Botnet Research Survey
暂无分享,去创建一个
Yan Chen | Keesook J. Han | Guohan Lu | Phil Roberts | Zhi Fu | Zhaosheng Zhu | Keesook Han | Zhaosheng Zhu | Guohan Lu | Z. Fu | Yan Chen | Phil Roberts
[1] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[2] Ken Chiang,et al. A Case Study of the Rustock Rootkit and Spam Bot , 2007, HotBots.
[3] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[4] Andreas Terzis,et al. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.
[5] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[6] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[7] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[8] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[9] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[10] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[11] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[12] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[13] Neil Daswani,et al. The Anatomy of Clickbot.A , 2007, HotBots.
[14] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[15] John Aycock,et al. Army of Botnets , 2007, NDSS.
[16] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[17] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.
[18] Guofei Gu,et al. A Taxonomy of Botnet Structures , 2007, ACSAC.
[19] Alex Brodsky,et al. A Distributed Content Independent Method for Spam Detection , 2007, HotBots.
[20] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.