Understanding the domain registration behavior of spammers
暂无分享,去创建一个
Nick Feamster | Vern Paxson | Scott Hollenbeck | Christian Kreibich | Chris Grier | Shuang Hao | Matthew Thomas | V. Paxson | Matthew Thomas | N. Feamster | Chris Grier | C. Kreibich | S. Hao | S. Hollenbeck
[1] Paul V. Mockapetris,et al. Domain names: Concepts and facilities , 1983, RFC.
[2] An analysis of wide-area name server traffic: a study of the Internet Domain Name System , 1992, SIGCOMM '92.
[3] Peter B. Danzig,et al. An analysis of wide-area name server traffic: a study of the Internet Domain Name System , 1992, SIGCOMM 1992.
[4] V. Paxson,et al. Wide-area traffic: the failure of Poisson modeling , 1994, SIGCOMM.
[5] Scott Hollenbeck,et al. Extensible Provisioning Protocol , 2000 .
[6] Robert Tappan Morris,et al. DNS performance and the effectiveness of caching , 2001, IMW '01.
[7] Scott Hollenbeck,et al. VeriSign Registry Registrar Protocol (RRP) Version 2.0.0 , 2003, RFC.
[8] J. Springael,et al. A lost sales inventory model with a compound poisson demand pattern , 2005 .
[9] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[10] Michael K. Reiter,et al. Understanding Domain Registration Abuses , 2010, SEC.
[11] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[12] Vern Paxson,et al. On the Potential of Proactive Domain Blacklisting , 2010, LEET.
[13] Wenke Lee,et al. Detecting Malware Domains at the Upper DNS Hierarchy , 2011, USENIX Security Symposium.
[14] Nick Feamster,et al. Monitoring the initial DNS behavior of malicious domains , 2011, IMC '11.
[15] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[16] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[17] He Liu,et al. On the Effects of Registrar-level Intervention , 2011, LEET.
[18] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.