Behavioral analysis of botnets for threat intelligence
暂无分享,去创建一个
Dustin Burke | Alper K. Caglayan | Mike Toothaker | Dan Drapeau | Gerry Eaton | A. Caglayan | M. Toothaker | Dan Drapeau | Dustin Burke | Gerry Eaton
[1] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[2] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[3] Lorenzo Martignoni,et al. FluXOR: Detecting and Monitoring Fast-Flux Service Networks , 2008, DIMVA.
[4] Minaxi Gupta,et al. Phishing Infrastructure Fluxes All the Way , 2009, IEEE Security & Privacy.
[5] Dustin Burke,et al. Real-Time Detection of Fast Flux Service Networks , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[6] E. Tufte. Beautiful Evidence , 2006 .
[7] Wei Jiang,et al. Botnet: Survey and Case Study , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).
[8] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[9] Dustin Burke,et al. Behavioral Patterns of Fast Flux Service Networks , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[10] Minaxi Gupta,et al. Behind Phishing: An Examination of Phisher Modi Operandi , 2008, LEET.
[11] Christopher Leckie,et al. Collaborative Detection of Fast Flux Phishing Domains , 2009, J. Networks.
[12] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2008, CCS.
[13] Dustin Burke,et al. Behavioral analysis of fast flux service networks , 2009, CSIIRW '09.
[14] Nick Feamster,et al. Dynamics of Online Scam Hosting Infrastructure , 2009, PAM.
[15] Duane Wessels,et al. Passive Monitoring of DNS Anomalies , 2007, DIMVA.