A Large-Scale Empirical Study of Conficker
暂无分享,去创建一个
[1] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[2] Guofei Gu,et al. Conficker and beyond: a large-scale empirical study , 2010, ACSAC '10.
[3] Guofei Gu,et al. Misleading and defeating importance-scanning malware propagation , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[4] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[5] David Moore,et al. The Spread of the Witty Worm , 2004, IEEE Secur. Priv..
[6] Anja Feldmann,et al. NAT Usage in Residential Broadband Networks , 2011, PAM.
[7] Aaron Hackworth,et al. Botnets as a Vehicle for Online Crimes , 2006 .
[8] Felix C. Freiling,et al. Walowdac - Analysis of a Peer-to-Peer Botnet , 2009, 2009 European Conference on Computer Network Defense.
[9] Fang Yu,et al. On Network-level Clusters for Spam Detection , 2010, NDSS.
[10] Insup Lee,et al. Spam mitigation using spatio-temporal reputations from blacklist history , 2010, ACSAC '10.
[11] Hassen Saïdi,et al. A Foray into Conficker's Logic and Rendezvous Points , 2009, LEET.
[12] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[13] Nicolas Ianelli,et al. Botnets as a Vehicle for Online Crime , 2007 .
[14] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[15] Fang Yu,et al. How dynamic are IP addresses? , 2007, SIGCOMM '07.
[16] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[17] Kevin C. Almeroth,et al. FIRE: FInding Rogue nEtworks , 2009, 2009 Annual Computer Security Applications Conference.
[18] Geoff Hulten,et al. Spamming botnets: signatures and characteristics , 2008, SIGCOMM '08.