dc.identifier.citation |
1 J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by irc nickname evaluation. In USENIX Workshop on Hot Topics in Under- standing Botnets (HotBots'07), 2007. 2 G. Gu, J. Zhang, and W. Lee. BotSni er: Detecting botnet command and control channels in network traf?c. In Proceedings of the 15th An- nual Network and Distributed System Security Symposium (NDSS'08), 2008 3 G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traf?c for Protocol- and Structure-Independent Botnet Detection. In USENIX Security, 2008. 4 G. Jacob, R. Hund, C. Kruegel, and T. Holz. Jackstraws: Picking Command and Control Connections from Bot Tra c. USENIX Secu- rity, 2011. 5 Florian Tegeler, Xiaoming Fu, Giovanni Vigna, Christopher Kruegel. BotFinder: Finding Bots in Network Traf?c Without Deep Packet In- spection. Co-NEXT 2012 6 G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee.BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In USENIX Security, 2007. 7 N. Kiyavash, A. Houmansadr, and N. Borisov, "Multi ow attacks against network ow watermarking schemes," in USENIX Security Symposium, P. van Oorschot, Ed. Berkeley, CA, USA: USENIX Association, 2008. 40 |
en_US |