Arquitetura Distribuída e Automatizada para Mitigação de Botnet Baseada em Análise Dinâmica de Malwares
暂无分享,去创建一个
[1] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[2] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[3] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[4] Arvind Krishnamurthy,et al. Studying Spamming Botnets Using Botlab , 2009, NSDI.
[5] Andreas Terzis,et al. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.
[6] Chris Kanich,et al. Spamcraft: An Inside Look At Spam Campaign Orchestration , 2009, LEET.
[7] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[8] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[9] Tom Kelchner. The (in)consistent naming of malcode , 2010 .
[10] Neil Daswani,et al. The Anatomy of Clickbot.A , 2007, HotBots.
[11] John C. Mitchell,et al. Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods , 2008, WOOT.
[12] Paul Barford,et al. Toward Botnet Mesocosms , 2007, HotBots.
[13] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[14] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[15] Willa K. Ehrlich,et al. Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling , 2010, LEET.
[16] Steve Romig,et al. The OSU Flow-tools Package and CISCO NetFlow Logs , 2000, LISA.
[17] W. Timothy Strayer,et al. Botnet Detection Based on Network Behavior , 2008, Botnet Detection.
[18] Thorsten Holz,et al. As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[19] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[20] Heejo Lee,et al. Botnet Detection by Monitoring Group Activities in DNS Traffic , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[21] Zongpeng Li,et al. sFlow: towards resource-efficient and agile service federation in service overlay networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[22] Lisandro Zambenedetti Granville,et al. Honeypots as a security mechanism , 2006 .
[23] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[24] Christopher Krügel,et al. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits , 2008, WOOT.
[25] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[26] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[27] Felix C. Freiling,et al. Walowdac - Analysis of a Peer-to-Peer Botnet , 2009, 2009 European Conference on Computer Network Defense.
[28] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[29] Gerhard Münz,et al. Internet Engineering Task Force (ietf) Definitions of Managed Objects for Ip Flow Information Export , 2022 .
[30] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[31] Chung-Huang Yang,et al. Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot , 2009, ICHIT '09.
[32] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[33] Tobias Lauinger,et al. Honeybot, Your Man in the Middle for Automated Social Engineering , 2010, LEET.
[34] Zhuoqing Morley Mao,et al. Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[35] Wagner Meira,et al. A Campaign-based Characterization of Spamming Strategies , 2008, CEAS.