| Document Date: 2008-07-14 18:18:35 Open Document File Size: 415,09 KBShare Result on Facebook
City Atlanta / / Company Argus / Google / Damballa Inc. / Yahoo! / Cisco / / Country United States / / / Event Natural Disaster / / Facility College of Computing / Georgia Institute of Technology / Judy library / / IndustryTerm backbone router / network routers / campus network / capture tool / normal network / real-time network traffic / normal application protocols / Open source solutions / clustering algorithms / Internet Relay Chat / Web drive-by download / Internet attacks / large networks / possible solutions / efficient network / communications patterns / binary using tools / internal and external networks / efficient algorithm / encrypted communications / speed networks / Web traffic / Internet security / specific search keys / search operations / application protocols / virtual network / Web-based C&C communications / normal applications / Web server / detection algorithms / peer communications / open-source intrusion detection tool / le sharing software / controlled virtual network / / OperatingSystem Unix / Linux / DoS / Windows XP / Microsoft Windows / / Organization USENIX Association / USENIX Association USENIX Association / Georgia Institute of Technology / College of Computing / / Person Ai / Roberto Perdisci / / Position representative / / Product BotMiner / IRC / BotMiner prototype system / BotMiner detection system / Davies-Bouldin (DB) / / ProgrammingLanguage Java / / ProvinceOrState Georgia / / Technology SNMP / backbone router / X-means clustering algorithm / two-step clustering algorithm / peer-to-peer / Linux / Unix / API / X-means algorithm / P2P / UDP / TCP/IP / application protocols / network protocol / efficient algorithm / C&C protocol / normal application protocols / DNS / Java / botnet C&C protocol / network routers / USENIX Association detection algorithms / HTTP / same protocol / same algorithm / edge router / Web server / / URL http /
SocialTag |