Building a dynamic reputation system for dns, Usenix Security Symposium, 2010. ,
From throw-away traffic to bots: Detecting the rise of dga-based malware, USENIX Security Symposium, 2012. ,
Efficient detection of split personalities in malware, International Symposium on Network and Distributed System Security (NDSS), 2010. ,
Disclosure, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, 2012. ,
DOI : 10.1145/2420950.2420969
Exposure, Symposium on Network and Distributed System Security, 2011. ,
DOI : 10.1145/2584679
Botnet Detection by Monitoring Group Activities in DNS Traffic, 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 2007. ,
DOI : 10.1109/CIT.2007.90
An introduction to support vector machines and other kernel-based learning methods, 2000. ,
DOI : 10.1017/CBO9780511801389
On the potential of proactive domain blacklisting, Third USENIX LEET Workshop, 2010. ,
Measuring and detecting fast-flux service networks, Symp. on Network and Distributed System Security, 2008. ,
Jackstraws: Picking command and control connections from bot traffic, USENIX Security Symposium, 2011. ,
PeerViewer: Behavioral Tracking and Classification of P2P Malware, 5th Int. Symposium on Cyberspace Safety and Security (CSS), 2013. ,
DOI : 10.1007/978-3-319-03584-0_21
BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis, 12th Int. Conf. Cryptology and Network Security (CANS), 2013. ,
DOI : 10.1007/978-3-319-02937-5_9
Induction of Selective Bayesian Classifiers, 10th international conference on Uncertainty in artificial intelligence, pp.399-406, 1994. ,
DOI : 10.1016/B978-1-55860-332-5.50055-9
Dns encoding of network names and other types, RFC, vol.1101, 1989. ,
DOI : 10.17487/rfc1101
Exploring Multiple Execution Paths for Malware Analysis, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007. ,
DOI : 10.1109/SP.2007.17
C4.5: Programs for machine learning, 1993. ,
A multifaceted approach to understanding the botnet phenomenon, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177086
Shades of grey: On the effectiveness of reputation-based " blacklists, International Conference on Malicious and Unwared Software (Malware), 2008. ,
Automatically Generating Models for Botnet Detection, 14th European Symposium on Research in Computer Security (ESORICS), 2009. ,
DOI : 10.1007/978-3-540-70542-0_6
Detecting algorithmically generated malicious domain names, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010. ,
DOI : 10.1145/1879141.1879148