communications encryption / chine learning algorithms / Internet Worm / similar communications / similar communications activity / communications-plane clustering / detection algorithm / hub server / botnet communications / internal network / /
Organization
Tight Command / Stanford University / /
Person
G. M. Voelker / V / P. Porras / V / John C. Mitchell / Dan Boneh / Collin Jackson / Guofei Gu / Chars Time Net-Det / Phil Porras / Lorenzo Worm / Adam Barth / J. B. Grizzard / V / /
Position
model for IRC / candidate control flows / Miner / command interpreter / candidate control conversation ing / representative / bot writer / /
Product
E3 / Hosts / data Attack time thresholds Inject packet / /