Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Using Failure Information Analysis to Detect Enterprise ZombiesPublished by Springer Science and Business Media LLC ,2009
- As the net churns: Fast-flux botnet observationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Antisocial Networks: Turning a Social Network into a BotnetLecture Notes in Computer Science, 2008
- Spamming botnetsPublished by Association for Computing Machinery (ACM) ,2008
- Identification of file infecting viruses through detection of self-reference replicationJournal of Computer Virology and Hacking Techniques, 2008
- A Taxonomy of Botnet StructuresPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Using uncleanliness to predict future botnet addressesPublished by Association for Computing Machinery (ACM) ,2007
- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol GraphsLecture Notes in Computer Science, 2007
- FinjanInfosecurity, 2007
- Characterizing Bots’ Remote Control BehaviorLecture Notes in Computer Science, 2007