RatBot: Anti-enumeration Peer-to-Peer Botnets
暂无分享,去创建一个
[1] Moritz Steiner,et al. Analyzing peer behavior in KAD , 2007 .
[2] Marcin Pietrzyk. Digging into KAD users' shared folders , 2008 .
[3] Andreas Terzis,et al. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.
[4] Michael K. Reiter,et al. Traffic Aggregation for Malware Detection , 2008, DIMVA.
[5] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[6] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[7] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.
[8] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[9] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[10] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[11] Sven Dietrich,et al. Analysis of the Storm and Nugache Trojans: P2P Is Here , 2007, login Usenix Mag..
[12] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[13] John Aycock,et al. Army of Botnets , 2007, NDSS.
[14] Jason Bock,et al. NET security , 2002 .
[15] Yinglian Xie,et al. How dynamic are IP addresses , 2007, SIGCOMM 2007.
[16] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[17] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[18] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[19] Robert Beverly,et al. Understanding the efficacy of deployed internet source address validation filtering , 2009, IMC '09.
[20] Taoufik En-Najjary,et al. A global view of kad , 2007, IMC '07.
[21] Felix C. Freiling,et al. Walowdac - Analysis of a Peer-to-Peer Botnet , 2009, 2009 European Conference on Computer Network Defense.
[22] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[23] Dawn Stover. Never fear, Bear is here to help , 2007 .
[24] Yongdae Kim,et al. Towards complete node enumeration in a peer-to-peer botnet , 2009, ASIACCS '09.
[25] Christopher Krügel,et al. Overbot: a botnet protocol based on Kademlia , 2008, SecureComm.
[26] Dawn Song,et al. Malware Detection , 2010, Advances in Information Security.
[27] Guanhua Yan,et al. AntBot: Anti-pollution peer-to-peer botnets , 2011, Comput. Networks.
[28] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.