G. Gu, R. Perdisci, J. Zhang, and W. Lee, Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection, USENIX Security Symposium, pp.139-154, 2008.

J. M. Rao and D. H. Reiley, The Economics of Spam, Journal of Economic Perspectives, vol.26, issue.3, pp.87-110, 2012.
DOI : 10.1257/jep.26.3.87

M. Van-eeten, J. M. Bauer, H. Asghari, S. Tabatabaie, and D. Rand, The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data, WEIS 2010: Ninth Workshop on the Economics of Information Security, 2010.
DOI : 10.1787/5km4k7m9n3vj-en

G. C. Moura, Bad neighborhoods on the internet, IEEE Communications Magazine, vol.52, issue.7, 2013.
DOI : 10.1109/MCOM.2014.6852094

URL : http://eprints.eemcs.utwente.nl/secure2/00025862/01/06852094.pdf

M. P. Collins, T. J. Shimeall, S. Faber, J. Janies, R. Weaver et al., Using uncleanliness to predict future botnet addresses, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.93-104, 2007.
DOI : 10.1145/1298306.1298319

A. Ramachandran and N. Feamster, Understanding the Network-level Behavior of Spammers, Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ser. SIGCOMM '06, pp.291-302, 2006.

W. Van-wanrooij and A. Pras, Filtering spam from bad neighborhoods, International Journal of Network Management, vol.25, issue.1, pp.433-444, 2010.
DOI : 10.1002/nem.753

G. Huston, Opinion: The ISP ? The Uncommon Carrier, The Internet Protocol Journal, vol.5, issue.3, pp.23-27, 2002.

Q. Tang, L. Linden, J. Quarterman, and A. Whinston, Improving internet security through social information and social comparison: A field quasi-experiment, WEIS 2013: Twelfth Workshop on the Economics of Information Security, 2013.

W. H. Baker, L. P. Rees, and P. S. Tippett, Necessary measures, Communications of the ACM, vol.50, issue.10, pp.101-106, 2007.
DOI : 10.1145/1290958.1290969

L. P. Rees, J. K. Deane, T. R. Rakes, and W. H. Baker, Decision support for Cybersecurity risk planning, Decision Support Systems, vol.51, issue.3, pp.493-505, 2011.
DOI : 10.1016/j.dss.2011.02.013

C. Kaner, S. Member, and W. P. Bond, Software engineering metrics: What do they measure and how do we know, 2004.

M. Fabian and M. Terzis, My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging, Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets, 2007.

R. Ncc, B. Atlas, M. Stone-gross, L. Cova, B. Cavallaro et al., Available: https://atlas.ripe.net 15 Your botnet is my botnet: analysis of a botnet takeover, Proceedings of the 16th ACM conference on Computer and communications security, pp.635-647, 2009.

. Microsoft, Microsoft Security Intelligence Report

. Mcafee, McAfee Threats Report

. Trendmicro, Security Research and Threat Analysis Available: http:// www.trendmicro.com/us/security-intelligence/research-and-analysis/index