Building a dynamic reputation system for DNS, Proceedings of the 19th USENIX Security Symposium (Secu- rity'10). USENIX Association, 2010. ,
Identifying botnets by capturing group activities in DNS traffic, Computer Networks, vol.56, issue.1, pp.20-33, 2011. ,
DOI : 10.1016/j.comnet.2011.07.018
Alert correlation in a cooperative intrusion detection framework, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.202-215, 2002. ,
DOI : 10.1109/SECPRI.2002.1004372
Identifying Malware Using Cross-Evidence Correlation ,
DOI : 10.1007/978-3-642-24212-0_13
Rishi: Identifying bot-contaminated hosts by IRC nickname evaluation, HotBots'07: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, 2007. ,
Peer-to-peer botnets; Overview and case study, HotBots'07: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, 2007. ,
BotSniffer: Detecting botnet command and control channels in network traffic, NDSS'08: Proceedings of the 15th Annual Network and Distributed System Security Symposium, 2008. ,
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection, Proceedings of the 17th conference on Security symposium, pp.139-154, 2008. ,
BotHunter: Detecting malware infection through IDS-driven dialog correlation, Proceedings of the 16th USENIX Security Symposium, pp.167-182, 2007. ,
Botnets: Detection, measurement, disinfection and defence, Tech. rep, 2011. ,
Dynamics of trust evolution: Auto-configuration of disposiional trust dynamics, Proceedings of the International Conference on Security and Cryptography, pp.509-517, 2008. ,
Wide-scale botnet detection and characterization, HotBots'07: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, 2007. ,
Clustering botnet communication traffic based on n-gram feature selection, Computer Communications, vol.34, issue.3, pp.502-514, 2011. ,
DOI : 10.1016/j.comcom.2010.04.007
Formalizing Trust as a Computational Concept, 1994. ,
Flow-based identification of botnet traffic by mining multiple log files, 2008 First International Conference on Distributed Framework and Applications, 2008. ,
DOI : 10.1109/ICDFMA.2008.4784437
Constructing attack scenarios through correlation of intrusion alerts, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.245-254, 2002. ,
DOI : 10.1145/586110.586144
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.3790
Community Epidemic Detection Using Time-Correlated Anomalies, 6307 in Lecture Notes in Computer Science, pp.360-381, 2010. ,
DOI : 10.1007/978-3-642-15512-3_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.4701
A multi-perspective analysis of the Storm (peacomm) worm, Tech. rep., SRI International, 2007. ,
Conficker C analysis, available online, 2009. ,
Revealing botnet membership using DNSBL counter-intelligence, SRUTI'06: Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, pp.49-54, 2006. ,
DOI : 10.1007/978-0-387-68768-1_7
Snort ? lightweight intrusion detection for networks, Proceedings of Usenix LISA'99. USENIX Association, 1999. ,
Detecting P2P botnets through network behavior analysis and machine learning, 2011 Ninth Annual International Conference on Privacy, Security and Trust, 2011. ,
DOI : 10.1109/PST.2011.5971980
Secure data aggregation in wireless sensor networks, Wireless Sensor Networks Security, 2008. ,
EFFORT: Efficient and effective bot malware detection, Proceedings of 31st Annual IEEE Conference on Computer Communications (INFOCOM'12), 2012. ,
The waledac protocol: The how and why, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009. ,
DOI : 10.1109/MALWARE.2009.5403015
Characterizing bots' remote control behavior, Botnet Detection, Advances in Information Security, pp.45-64, 2008. ,
DOI : 10.1007/978-3-540-73614-1_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.9155
Botnet detection based on network behaviour, Botnet Detection, Advances in Information Security, pp.1-24, 2008. ,
Symantec global internet security threat report, trends for 2010, Security Report XVI, Symantec Inc, 2011. ,
Counterclank bot, available online, pp.2012-012709, 2012. ,
Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic, 2008 5th IEEE Consumer Communications and Networking Conference, pp.476-481, 2008. ,
DOI : 10.1109/ccnc08.2007.112
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.1318
Collaboration-based Botnet Detection Architecture, 2009 Second International Conference on Intelligent Computation Technology and Automation, 2009. ,
DOI : 10.1109/ICICTA.2009.326
Botnet detection architecture based on heterogeneous multisensor information fusion, Journal of Networks, vol.6, issue.12, pp.1655-1661, 2011. ,
DOI : 10.4304/jnw.6.12.1655-1661
An Advanced Hybrid Peer-to-Peer Botnet, HotBots'07: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, 2007. ,
DOI : 10.1109/TDSC.2008.35
Improving collaborative filtering with trust-based metrics, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.1860-1864, 2006. ,
DOI : 10.1145/1141277.1141717
Detection of botnets using combined host-and network-level information, Proceedings of 40th International Conference on Dependable Systems and Networks (DSN), 2010. ,
Detecting stealthy P2P botnets using statistical traffic fingerprints, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp.121-132, 2011. ,
DOI : 10.1109/DSN.2011.5958212
Outlier Detection Techniques for Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.12, issue.2, 2010. ,
DOI : 10.1109/SURV.2010.021510.00088