Next: About this document ...
Up: :
Previous: Acknowledgments
- 1
-
Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, and Felix
Freiling.
The Nepenthes Platform: An Efficient Approach to Collect Malware.
In Proceedings of the International Symposium on Recent
Advances in Intrusion Detection (RAID), September 2006.
- 2
-
Paul Barford and Vinod Yagneswaran.
An Inside Look at Botnets.
Advances in Information Security. Springer, 2007.
- 3
-
Martin Casado and Michael Freedman.
Peering through the shroud: The effect of edge opacity on IP-based
client authentication.
In Proceedings of USENIX Symposium on Networked Systems
Design and Implementation (NDSI), April 2007.
- 4
-
Evan Cooke, Farnam Jahanian, and Danny McPherson.
The Zombie Roundup: Understanding, Detecting, and Disturbing
Botnets.
In Proceedings of the first Workshop on Steps to Reducing
Unwanted Traffic on the Internet, July 2005.
- 5
-
David Dagon, Cliff Zou, and Wenke Lee.
Modeling Botnet Propagation Using Time Zones.
In Proceedings of the Network and Distributed System
Security Symposium NDSS, February 2006.
- 6
-
DNS Cache Snooping or Snooping the Cache for Fun and Profit.
Available at:
https://www.sysvalue.com/papers/DNS-Cache-Snooping/files/DNS_Cache_Snooping_1.1.pdf.
- 7
-
Felix Freiling, Thorsten Holz, and Georg Wicherski.
Botnet Tracking: Exploring a root-cause methodology to prevent
denial-of-service attaks.
In Proceedings of European Symposium on Research in
Computer Security, ESORICS, September 2005.
- 8
-
Allen Householder and Roman Danyliw.
Increased Activity Targeting Windows Shares.
Technical Report CA-2003-08, CERT, 2003.
- 9
-
Farnam Jahanian.
Enter the Botnet: An Introduction to the Post-Worm Era.
ARO-DARPA-DHS Special Workshop on Botnets, 2006.
- 10
-
Wenke Lee, Cliff Wang, and David Dagon.
Botnet Detection: Countering the Largest Security Threat.
Springer Verlag, July 2007.
- 11
-
John Markoff.
Attack of the Zombie Computers Is a Growing Threat, Experts Say.
In New York Times, January 2007.
- 12
-
Bill McCarty.
Botnets: Big and bigger.
IEEE Security and Privacy Magazine, 1(4):87-90, 2003.
- 13
-
Laurianne McLaughlin.
Bot software spreads, causes new worries.
IEEE Distributed Systems Online, June 2004.
- 14
-
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis.
A Multifaceted Approach to Understanding the Botnet Phenomenon.
In Proceedings of ACM SIGCOMM/USENIX Internet Measurement
Conference (IMC), pages 41-52, Oct., 2006.
- 15
-
Anirudh Ramachandran, Nick Feamster, and David Dagon.
Revealing Botnet Membership using DNSBL Counter-Intelligence.
In Proceedings of the 2 Workshop on Steps to Reducing
Unwanted Traffic on the Internet (SRUTI), July 2006.
- 16
-
L. Spitzner.
The Honeynet Project: Trapping the Hackers.
IEEE Security and Privacy Magazine, 1(2):15-23, 2003.
- 17
-
T. Sterling.
Prosecutors say Dutch suspects hacked 1.5 million computers world
wide.
Associated Press, October 2005.
- 18
-
CNN Technology.
Expert: Botnets No. 1 emerging Internet threat. Online article, see
https://edition.cnn.com/2006/TECH/internet/01/31/furst/index.html.
- 19
-
Cliff C. Zou and Ryan Cunningham.
Honeypot-Aware Advanced Botnet Construction and Maintenance.
In Proceedings of the 2006 International Conference on
Dependable Systems and Networks (DSN), 2006.
Fabian Monrose
2007-04-03