A Taxonomy of Botnet Structures
暂无分享,去创建一个
Guofei Gu | Wenke Lee | David Dagon | Christopher P. Lee | Wenke Lee | D. Dagon | G. Gu | Christopher P. Lee
[1] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[2] Béla Bollobás,et al. Random Graphs , 1985 .
[3] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[4] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, S&P 1997.
[5] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[6] David Brumley. Tracking hackers on IRC , 1999 .
[7] Vern Paxson,et al. On estimating end-to-end network path properties , 2001, SIGCOMM LA '01.
[8] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[9] Christophe Kalt. Internet Relay Chat: Architecture , 2000, RFC.
[10] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[11] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[12] Carol Simpson,et al. Internet Relay Chat. , 2000 .
[13] M. Newman,et al. Random graphs with arbitrary degree distributions and their applications. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.
[14] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[15] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[16] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[17] Ian T. Foster,et al. Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems , 2002, IPTPS.
[18] Edith Cohen,et al. Search and replication in unstructured peer-to-peer networks , 2002 .
[19] Ian T. Foster,et al. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.
[20] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[21] Manish Jain,et al. End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput , 2002, SIGCOMM 2002.
[22] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[23] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[24] Donald F. Towsley,et al. Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.
[25] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[26] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[27] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[28] Robert S. Gray,et al. Using sensor networks and data fusion for early detection of active worms , 2003, SPIE Defense + Commercial Sensing.
[29] Robert K. Cunningham,et al. A taxonomy of computer worms , 2003, WORM '03.
[30] David Moore,et al. The Spread of the Witty Worm , 2004, IEEE Secur. Priv..
[31] Michael K. Reiter,et al. Seurat: A Pointillist Approach to Anomaly Detection , 2004, RAID.
[32] Guofei Gu,et al. Worm detection, early warning and response based on local victim information , 2004, 20th Annual Computer Security Applications Conference.
[33] Kymie M. C. Tan,et al. A defense-centric taxonomy based on attack manifestations , 2004, International Conference on Dependable Systems and Networks, 2004.
[34] Don Towsley,et al. Routing worm: a fast, selective attack worm based on IP address information , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[35] Helen J. Wang,et al. Virtual Playgrounds for Worm Behavior Investigation , 2005, RAID.
[36] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[37] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[38] Ryan Cunningham,et al. Honeypot-Aware Advanced Botnet Construction and Maintenance , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[39] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[40] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[41] Shishir Nagaraja,et al. The Topology of Covert Conflict , 2005, WEIS.
[42] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[43] John Aycock,et al. Attack of the 50 Foot Botnet , 2006 .
[44] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[45] Andreas Terzis,et al. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.
[46] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[47] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[48] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[49] John Aycock,et al. Army of Botnets , 2007, NDSS.
[50] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.