Rustock botnet

Results: 31



#Item
1Spamming / Computer network security / Multi-agent systems / Domain name system / Botnets / Command and control / Rustock botnet / Name server / Email spam / OpenDNS / DNS sinkhole

On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:20:24
2Computer network security / Multi-agent systems / Spamming / Botnets / United States v. Nosal / Computer Fraud and Abuse Act / Zombie / Computer worm / Mariposa botnet / Conficker / Rustock botnet / Srizbi botnet

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Add to Reading List

Source URL: www.accessnow.org

Language: English - Date: 2015-09-14 16:04:23
3Botnet / Anti-spam techniques / Email spam / Spam / Internet bot / Rustock botnet / Email / Open mail relay / Video game bot / Spamming / Computing / Internet

2014 IEEE Security and Privacy Workshops The Tricks of the Trade: What Makes Spam Campaigns Successful? Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of Califor

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-30 03:11:46
4Spamming / Botnets / Rustock botnet / Internet Relay Chat / Video game bot / IRCd / DoSnet / Srizbi botnet / Computing / Multi-agent systems / Computer network security

Lecture 29: Bots and Botnets Lecture Notes on “Computer and Network Security” by Avi Kak () April 22, 2015 1:28pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-22 13:30:29
5Computer network security / Internet / Botnets / Rustock botnet / Malware / PageRank / Lethic botnet / Spam / Koobface / Computing / Spamming / Multi-agent systems

Examining Social Dynamics for Countering Botnet Attacks Ziming Zhao, Gail-Joon Ahn, and Hongxin Hu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA {zmzhao,

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2011-09-14 00:34:17
6Cybercrime / Anti-spam techniques / Botnet / Email spam / Spam / Web threat / McColo / Malware / Rustock botnet / Spamming / Computing / Internet

Microsoft Word - Semi-Annual TRACElabs_Report_Jun_2009 _3_.doc

Add to Reading List

Source URL: www.m86security.com

Language: English - Date: 2013-03-18 22:22:28
7Computer network security / Multi-agent systems / Electronic commerce / Botnets / Internet bot / Rustock botnet / Denial-of-service attack / Web search query / Click fraud / Computing / Spamming / Internet

SBotMiner: Large Scale Search Bot Detection Fang Yu, Yinglian Xie, and Qifa Ke Microsoft Research Silicon Valley Mountain View, CAUSA fangyu,yxie,

Add to Reading List

Source URL: www.wsdm-conference.org

Language: English - Date: 2009-12-30 02:07:56
8Multi-agent systems / Botnets / Internet / Rustock botnet / Email spam / Spam / Mega-D botnet / Cutwail botnet / Deep packet inspection / Computing / Spamming / Computer network security

Emergency Slice and In-Network DPI as application of network virtualization Japan-EU Workshop on Future Internet/New Generation Network Aki Nakao University of Tokyo

Add to Reading List

Source URL: www.prime-pco.com

Language: English - Date: 2012-01-30 05:25:35
9Computing / Computer virus / Dr. Web / Malware / Anti-spam techniques / Botnet / Microsoft Exchange Server / Rustock botnet / Avast! / Antivirus software / Software / System software

You have what to protect? We have We have

Add to Reading List

Source URL: st.drweb.com

Language: English - Date: 2015-04-09 02:59:45
10Botnets / Spamming / Malware / Cyberwarfare / Storm botnet / Zeus / Rustock botnet / Storm Worm / Rootkit / Computing / Computer network security / Multi-agent systems

On the Analysis of the Zeus Botnet Crimeware Toolkit H. Binsalleeh †‡, T. Ormerod †‡, A. Boukhtouta †‡, P. Sinha †‡, A. Youssef †‡, M. Debbabi †‡, and L. Wang †‡ † National Cyber Forensics a

Add to Reading List

Source URL: www.ncfta.ca

Language: English
UPDATE