Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection, USENIX Security Symposium, pp.139-154, 2008. ,
The Economics of Spam, Journal of Economic Perspectives, vol.26, issue.3, pp.87-110, 2012. ,
DOI : 10.1257/jep.26.3.87
The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data, WEIS 2010: Ninth Workshop on the Economics of Information Security, 2010. ,
DOI : 10.1787/5km4k7m9n3vj-en
Bad neighborhoods on the internet, IEEE Communications Magazine, vol.52, issue.7, 2013. ,
DOI : 10.1109/MCOM.2014.6852094
URL : http://eprints.eemcs.utwente.nl/secure2/00025862/01/06852094.pdf
Using uncleanliness to predict future botnet addresses, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.93-104, 2007. ,
DOI : 10.1145/1298306.1298319
Understanding the Network-level Behavior of Spammers, Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ser. SIGCOMM '06, pp.291-302, 2006. ,
Filtering spam from bad neighborhoods, International Journal of Network Management, vol.25, issue.1, pp.433-444, 2010. ,
DOI : 10.1002/nem.753
Opinion: The ISP ? The Uncommon Carrier, The Internet Protocol Journal, vol.5, issue.3, pp.23-27, 2002. ,
Improving internet security through social information and social comparison: A field quasi-experiment, WEIS 2013: Twelfth Workshop on the Economics of Information Security, 2013. ,
Necessary measures, Communications of the ACM, vol.50, issue.10, pp.101-106, 2007. ,
DOI : 10.1145/1290958.1290969
Decision support for Cybersecurity risk planning, Decision Support Systems, vol.51, issue.3, pp.493-505, 2011. ,
DOI : 10.1016/j.dss.2011.02.013
Software engineering metrics: What do they measure and how do we know, 2004. ,
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging, Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets, 2007. ,
Available: https://atlas.ripe.net 15 Your botnet is my botnet: analysis of a botnet takeover, Proceedings of the 16th ACM conference on Computer and communications security, pp.635-647, 2009. ,
Microsoft Security Intelligence Report ,
McAfee Threats Report ,
Security Research and Threat Analysis Available: http:// www.trendmicro.com/us/security-intelligence/research-and-analysis/index ,