Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
We are currently moving from the Internet society to a mobile society where more and more
access to information is done by previously dumb phones. For example, the number of …
access to information is done by previously dumb phones. For example, the number of …
[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …
[PDF][PDF] EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
The domain name service (DNS) plays an important role in the operation of the Internet,
providing a two-way map** between domain names and their numerical identifiers. Given …
providing a two-way map** between domain names and their numerical identifiers. Given …
Bothunter: Detecting malware infection through ids-driven dialog correlation.
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …
recognizing the infection and coordination dialog that occurs during a successful malware …
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the
root cause of a large number of security problems on the Internet. A particularly …
root cause of a large number of security problems on the Internet. A particularly …
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets,
however to date, very little is known about the behavior of these distributed computing …
however to date, very little is known about the behavior of these distributed computing …
A survey of botnet and botnet detection
M Feily, A Shahrestani… - 2009 Third International …, 2009 - ieeexplore.ieee.org
Among the various forms of malware, botnets are emerging as the most serious threat
against cyber-security as they provide a distributed platform for several illegal activities such …
against cyber-security as they provide a distributed platform for several illegal activities such …
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
As more and more Internet-based attacks arise, organizations are responding by deploying
an assortment of security products that generate situational intelligence in the form of logs …
an assortment of security products that generate situational intelligence in the form of logs …
The crossfire attack
MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …