Characterizing the IRC-based Botnet Phenomenon
暂无分享,去创建一个
Wei Zou | Jianwei Zhuge | Xinhui Han | Jinpeng Guo | Thorsten Holz | Thorsten Holz | Wei Zou | Xinhui Han | Jianwei Zhuge | Jinpeng Guo
[1] Andreas Terzis,et al. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.
[2] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[3] John Canavan. The evolution of malicious IRC bots , 2005 .
[4] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[5] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[6] Carol Simpson,et al. Internet Relay Chat. , 2000 .
[7] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[8] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[9] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[10] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[11] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[12] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[13] Zhuoqing Morley Mao,et al. Toward understanding distributed blackhole placement , 2004, WORM '04.
[14] Christophe Kalt. Internet Relay Chat: Architecture , 2000, RFC.
[15] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.
[16] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.