A comprehensive study of email spam botnet detection

WZ Khan, MK Khan, FTB Muhaya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …

Click trajectories: End-to-end analysis of the spam value chain

K Levchenko, A Pitsillidis, N Chachra… - … ieee symposium on …, 2011 - ieeexplore.ieee.org
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …

[PDF][PDF] The Underground Economy of Spam: A Botmaster's Perspective of Coordinating {Large-Scale} Spam Campaigns

B Stone-Gross, T Holz, G Stringhini… - 4th USENIX Workshop on …, 2011 - usenix.org
Spam accounts for a large portion of the email exchange on the Internet. In addition to being
a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many …

Effective botnet detection through neural networks on convolutional features

SC Chen, YR Chen, WG Tzeng - 2018 17th IEEE International …, 2018 - ieeexplore.ieee.org
Botnet is one of the major threats on the Internet for committing cybercrimes, such as DDoS
attacks, stealing sensitive information, spreading spams, etc. It is a challenging issue to …

Peerrush: Mining for unwanted p2p traffic

B Rahbarinia, R Perdisci, A Lanzi, K Li - … 2013, Berlin, Germany, July 18-19 …, 2013 - Springer
In this paper we present PeerRush, a novel system for the identification of unwanted P2P
traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can …

Peerrush: Mining for unwanted p2p traffic

B Rahbarinia, R Perdisci, A Lanzi, K Li - Journal of Information Security and …, 2014 - Elsevier
In this paper we present PeerRush, a novel system for the identification of unwanted P2P
traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can …

A reconfigurable shared scan-in architecture

S Samaranayake, E Gizdarski… - … . 21st VLSI Test …, 2003 - ieeexplore.ieee.org
In this paper, an efficient technique for test data volume reduction based on the shared scan-
in (Illinois Scan) architecture and the scan chain reconfiguration (Dynamic Scan) …

Applying deep learning on packet flows for botnet detection

J van Roosmalen, H Vranken… - Proceedings of the 33rd …, 2018 - dl.acm.org
Botnets constitute a primary threat to Internet security. The ability to accurately distinguish
botnet traffic from non-botnet traffic can help significantly in mitigating malicious botnets. We …

The harvester, the botmaster, and the spammer: On the relations between the different actors in the spam landscape

G Stringhini, O Hohlfeld, C Kruegel… - Proceedings of the 9th …, 2014 - dl.acm.org
A spammer needs three elements to run a spam operation: a list of victim email addresses,
content to be sent, and a botnet to send it. Each of these three elements are critical for the …

{BOTMAGNIFIER}: Locating Spambots on the Internet

G Stringhini, T Holz, B Stone-Gross, C Kruegel… - 20th USENIX Security …, 2011 - usenix.org
Unsolicited bulk email (spam) is used by cybercriminals to lure users into scams and to
spread malware infections. Most of these unwanted messages are sent by spam botnets …