Storm botnet

Results: 141



#Item
11Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Command and control / Storm botnet / Cluster analysis / Internet bot / Hierarchical clustering

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2008-05-09 14:43:43
12Computing / Concurrent computing / Distributed data storage / Computer network security / Multi-agent systems / Spamming / File sharing networks / Botnet / Storm botnet / Peer-to-Peer Protocol / Kademlia / Distributed hash table

PDF Document

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-03-17 14:13:56
13Computer network security / Internet / Botnets / Email / Email spam / Storm botnet / Mega-D botnet / McColo / Spam / Computing / Spamming / Multi-agent systems

Insights from the Inside: A View of Botnet Management from Infiltration Chia Yuan Cho§ , Juan Caballero†§ , Chris Grier§ , Vern Paxson‡§ , and Dawn Song§ § UC Berkeley † Carnegie Mellon University ‡ ICSI

Add to Reading List

Source URL: security.cs.berkeley.edu

Language: English - Date: 2011-03-08 19:40:30
14Computer network security / Computer-mediated communication / Horror fiction / Multi-agent systems / Email spam / Simple Mail Transfer Protocol / Postfix / Botnet / Storm botnet / Computing / Spamming / Email

IBM Research Zombies suck the life out of the mail server (“new developments” from LISA 2010 presentation)

Add to Reading List

Source URL: www.porcupine.org

Language: English - Date: 2010-11-18 10:10:00
15Spamming / Statistics / Botnets / Bots / Storm botnet / Internet bot / Cluster analysis / Storm Worm / Hierarchical clustering / Computer network security / Computing / Multi-agent systems

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-14 18:18:35
16Computer network security / Multi-agent systems / Spamming / File sharing networks / Deep packet inspection / Botnet / Peer-to-peer / ANts P2P / Storm botnet / Computing / Concurrent computing / Distributed computing

2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:19
17Botnet / Email spam / Spam / Storm botnet / Internet bot / DNSBL / BredoLab botnet / McColo / Waledac botnet / Spamming / Computing / Internet

The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns Brett Stone-Gross§, ? , Thorsten Holz‡, ? , Gianluca Stringhini§ , and Giovanni Vigna§, ? § University of Cal

Add to Reading List

Source URL: www.iseclab.org

Language: English - Date: 2011-03-11 14:42:23
18Multi-agent systems / Spamming / Cyberwarfare / Storm botnet / Storm Worm / Zombie / Waledac botnet / Torpig / Zeus / Computer network security / Computing / Botnets

– Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´

Add to Reading List

Source URL: wdb.ugr.es

Language: English - Date: 2013-09-30 02:59:52
19Anti-spam techniques / Spam / Email spam / Botnet / Storm botnet / Email filtering / Email / Spam email delivery / Srizbi botnet / Spamming / Computing / Internet

Spamalytics: An Empirical Analysis of Spam Marketing Conversion

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-08-26 20:24:17
20Denial-of-service attacks / Spamming / Cyberwarfare / Botnet / Denial-of-service attack / Internet Relay Chat / DoSnet / Storm botnet / Computer network security / Computing / Multi-agent systems

BlackEnergy DDoS Bot Analysis Jose Nazario, Ph.D. Arbor Networks October 2007

Add to Reading List

Source URL: atlas-public.ec2.arbor.net

Language: English - Date: 2007-10-10 14:05:38
UPDATE