Botnets

Results: 408



#Item
301   	
   Detecting	
  BotNet	
  Traffic	
  with	
  the	
  Cisco	
   Cyber	
  Threat	
  Defense	
  Solution	
  1.0	
  

    Detecting  BotNet  Traffic  with  the  Cisco   Cyber  Threat  Defense  Solution  1.0  

Add to Reading List

Source URL: www.cisco.com

Language: English
302To: From: Date: Subject:  National Institute of Standards and Technology, United States Department of Commerce

To: From: Date: Subject: National Institute of Standards and Technology, United States Department of Commerce

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2011-11-16 15:19:59
303White Paper  Analyzing Project Blitzkrieg, a Credible Threat Ryan Sherstobitoff, McAfee Labs

White Paper Analyzing Project Blitzkrieg, a Credible Threat Ryan Sherstobitoff, McAfee Labs

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:07:47
304On Measuring the Impact of DDoS Botnets Arne Welzel Christian Rossow  Herbert Bos

On Measuring the Impact of DDoS Botnets Arne Welzel Christian Rossow Herbert Bos

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-03-31 07:00:45
305White Paper  The New Era of Botnets By Zheng Bu, Pedro Bueno, Rahul Kashyap, and Adam Wosotowsky McAfee Labs™

White Paper The New Era of Botnets By Zheng Bu, Pedro Bueno, Rahul Kashyap, and Adam Wosotowsky McAfee Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:16
306SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets Christian Rossow∗‡ , Dennis Andriesse‡ , Tillmann Werner¶ , Brett Stone-Gross† , Daniel Plohmann§ , Christian J. Dietrich∗ , Her

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets Christian Rossow∗‡ , Dennis Andriesse‡ , Tillmann Werner¶ , Brett Stone-Gross† , Daniel Plohmann§ , Christian J. Dietrich∗ , Her

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2013-05-28 08:23:10
307P ROV E X: Detecting Botnets with Encrypted Command and Control Channels Christian Rossow †‡? and Christian J. Dietrich †¶ †University of Applied Sciences Gelsenkirchen, Institute for Internet Security, Germany

P ROV E X: Detecting Botnets with Encrypted Command and Control Channels Christian Rossow †‡? and Christian J. Dietrich †¶ †University of Applied Sciences Gelsenkirchen, Institute for Internet Security, Germany

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2013-04-16 08:32:23
308Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Dennis Andriesse1 , Christian Rossow1 , Brett Stone-Gross2 , Daniel Plohmann3 , and Herbert Bos1 1 VU University Amsterdam, The Netherlands, {d

Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Dennis Andriesse1 , Christian Rossow1 , Brett Stone-Gross2 , Daniel Plohmann3 , and Herbert Bos1 1 VU University Amsterdam, The Netherlands, {d

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2013-09-04 07:38:33
309On Botnets that use DNS for Command and Control Christian J. Dietrich†‡ , Christian Rossow∗‡ , Felix C. Freiling† , Herbert Bos∗ , Maarten van Steen∗ and Norbert Pohlmann‡ ∗

On Botnets that use DNS for Command and Control Christian J. Dietrich†‡ , Christian Rossow∗‡ , Felix C. Freiling† , Herbert Bos∗ , Maarten van Steen∗ and Norbert Pohlmann‡ ∗

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2011-08-23 12:06:04
310On Advanced Monitoring in Resilient and Unstructured P2P Botnets Shankar Karuppayah∗† , Mathias Fischer∗ , Christian Rossow‡ , Max M¨uhlh¨auser∗ ∗ Telecooperation  † National Advanced IPv6 Center, ‡ Hor

On Advanced Monitoring in Resilient and Unstructured P2P Botnets Shankar Karuppayah∗† , Mathias Fischer∗ , Christian Rossow‡ , Max M¨uhlh¨auser∗ ∗ Telecooperation † National Advanced IPv6 Center, ‡ Hor

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-03-07 04:29:38