[ Pobierz całość w formacie PDF ]
[107] N. Schear and D. M. Nicol. Performance analysis of real
traffic carried with encrypted cover flows. In PADS, pages 80 87,
Washington, DC, USA, 2008. IEEE Computer Society.
[108] B. Schneier. Security Awareness Training. https://www.
schneier.com/ blog/archives/2013/03/security_awaren_1.html,
2013.
[109] M. I. Sharif, A. Lanzi, J. T. Giffin, and W. Lee. Impeding malware
analysis using conditional code obfuscation. In NDSS. The Internet
Society, 2008.
[110] S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C.
Zhang. An empirical analysis of phishing blacklists. In CEAS, 2009.
[111] A. M. Smith and N. Y. Toppel. Case Study: Using Security
Awareness to Com- bat the Advanced Persistent Threat. In Proc. of
the Colloquium for Information Systems Security Education, 2009.
[112] E. Stinson and J. C. Mitchell. Characterizing bots remote control
behavior. In Botnet Detection. 2008.
[113] J. Stokes, R. Andersen, C. Seifert, and K. Chellapilla. WebCop:
Locating Neighborhoods of Malware on the Web. 2010.
[114] B.Stone-Gross,M.Cova,L.Cavallaro,B.Gilbert,M.Szydlowski,R.
Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is my Botnet:
Analysis of a Botnet Takeover. In Proc. of the ACM Conference on
Computer and Communications Security (CCS), 2009.
[115] B. Stone-Gross, M. Cova, C. Kruegel, and G. Vigna. Peering
Through the iFrame. In Proc. of the IEEE Conference on Computer
Communications (IN- FOCOM) Mini-Conference, 2011.
University of Birmingham | CPNI.gov.uk PAGE 36
Command & Control: Understanding, Denying and Detecting FEBRUARY 2014
Bibliography
[116] S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of
the Storm and Nugache trojans: P2P is here. ;login, 32(6), Dec. 2007.
[117] W. T. Strayer, D. E. Lapsley, R. Walsh, and C. Livadas. Botnet
detection based on network behavior. In Advances in Information
Security. 2008.
[118] G. Stringhini, M. Egele, A. Zarras, T. Holz, C. Kruegel, , and G.
Vigna. B@bel: Leveraging Email Delivery for Spam Mitigation. In Proc.
of the USENIX Security Symposium, 2012.
[119] G.Stringhini,T.Holz,B.Stone-Gross,C.Kruegel,,andG.Vigna.
BotMagnifier: Locating Spambots on the Internet. In Proc. of the
USENIX Security Symposium, 2011.
[120] Symantec. Internet Security Threat Report 2013 Volume 18.
Technical report, Symantec, Inc., 2013.
[121] Symantec. Linux back door uses covert communication
protocol.
http://www.symantec.com/connect/blogs/linux-back- door-uses-
covert-communication-protocol, 2013.
[122] Symantec Corp. Symantec Statement Regarding New York
Times Cyber Attack. http://www.symantec.com/connect/blogs/
symantec- statement-regarding-new-york-times-cyber-attack,
2013.
[123] P. Szor. The Art of Computer Virus Research and Defense.
Addison-Wesley Professional, 2005.
[124] K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and
Evaluation of a Real-Time URL Spam Filtering Service. In Proc. of the
IEEE Symposium on Security and Privacy, 2011.
[125] TrendLabs APT Research Team. Spear-Phishing Email: Most
Favored APT Attack Bait. Technical report, Trend Micro Incorporated,
2012.
[126] A. Vasudevan and R. Yerraballi. Cobra: Fine-grained malware
analysis using stealth localized-executions. In Proceedings of 2006
IEEE Symposium on Security and Privacy (Oakland.06, 2006.
[127] Verizon RISK Team. 2013 Data Breach Investigations Report.
Technical report, Verizon, 2013.
University of Birmingham | CPNI.gov.uk PAGE 37
Command & Control: Understanding, Denying and Detecting FEBRUARY 2014
Bibliography
[128] R. Villamar 1n-Salomo n and J. C. Brustoloni. Bayesian bot
detection based on dns traffic similarity. In SAC 09: Proceedings of
the 2009 ACM symposium on Applied Computing, pages 2035 2041,
New York, NY, USA, 2009. ACM.
[129] N. Villeneuve, N. Moran, and T. Haq. Evasive Tactics: Taidoor.
http: //www.fireeye.com/blog/technical/2013/09/evasive- tactics-
taidoor-3.html, 2013.
[130] Q. Wang, X. Gong, G. T. Nguyen, A. Houmansadr, and N.
Borisov. Censorspoofer: asymmetric communication using ip spoofing
for censorship-resistant web browsing. In Proceedings of the 2012
ACM conference on Computer and communications security, 2012.
[131] Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S.
Cheung, F. Wang, and D. Boneh. Stegotorus: a camouflage proxy
for the tor anonymity system. In Proceedings of the 2012 ACM
conference on Computer and communications security, 2012.
[132] C. Wisniewski. Twitter botnet command and control captured.
http://nakedsecurity.sophos.com/2010/05/18/twitter- botnet-
command-control-captured/, 2010.
[133] K. Xu, P. Butler, S. Saha, and D. Yao. DNS for Massive-Scale
Command and Control. IEEE Transactions on Dependable and Secure
Computing, 10(3), 2013.
[134] ydklijnsma. Large botnet cause of recent Tor network overload.
http://blog.fox-it.com/2013/09/05/large-botnet-cause- of-recent-
tor-network-overload/, 2013.
[135] T.-F. Yen and M. K. Reiter. Traffic aggregation for malware
detection. In DIMVA 08: Proceedings of the 5th international
conference on Detection of Intrusions and Malware, and Vulnerability
Assessment, pages 207 227, Berlin, Heidelberg, 2008. Springer-
Verlag. [ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl exclamation.htw.pl
[107] N. Schear and D. M. Nicol. Performance analysis of real
traffic carried with encrypted cover flows. In PADS, pages 80 87,
Washington, DC, USA, 2008. IEEE Computer Society.
[108] B. Schneier. Security Awareness Training. https://www.
schneier.com/ blog/archives/2013/03/security_awaren_1.html,
2013.
[109] M. I. Sharif, A. Lanzi, J. T. Giffin, and W. Lee. Impeding malware
analysis using conditional code obfuscation. In NDSS. The Internet
Society, 2008.
[110] S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C.
Zhang. An empirical analysis of phishing blacklists. In CEAS, 2009.
[111] A. M. Smith and N. Y. Toppel. Case Study: Using Security
Awareness to Com- bat the Advanced Persistent Threat. In Proc. of
the Colloquium for Information Systems Security Education, 2009.
[112] E. Stinson and J. C. Mitchell. Characterizing bots remote control
behavior. In Botnet Detection. 2008.
[113] J. Stokes, R. Andersen, C. Seifert, and K. Chellapilla. WebCop:
Locating Neighborhoods of Malware on the Web. 2010.
[114] B.Stone-Gross,M.Cova,L.Cavallaro,B.Gilbert,M.Szydlowski,R.
Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is my Botnet:
Analysis of a Botnet Takeover. In Proc. of the ACM Conference on
Computer and Communications Security (CCS), 2009.
[115] B. Stone-Gross, M. Cova, C. Kruegel, and G. Vigna. Peering
Through the iFrame. In Proc. of the IEEE Conference on Computer
Communications (IN- FOCOM) Mini-Conference, 2011.
University of Birmingham | CPNI.gov.uk PAGE 36
Command & Control: Understanding, Denying and Detecting FEBRUARY 2014
Bibliography
[116] S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of
the Storm and Nugache trojans: P2P is here. ;login, 32(6), Dec. 2007.
[117] W. T. Strayer, D. E. Lapsley, R. Walsh, and C. Livadas. Botnet
detection based on network behavior. In Advances in Information
Security. 2008.
[118] G. Stringhini, M. Egele, A. Zarras, T. Holz, C. Kruegel, , and G.
Vigna. B@bel: Leveraging Email Delivery for Spam Mitigation. In Proc.
of the USENIX Security Symposium, 2012.
[119] G.Stringhini,T.Holz,B.Stone-Gross,C.Kruegel,,andG.Vigna.
BotMagnifier: Locating Spambots on the Internet. In Proc. of the
USENIX Security Symposium, 2011.
[120] Symantec. Internet Security Threat Report 2013 Volume 18.
Technical report, Symantec, Inc., 2013.
[121] Symantec. Linux back door uses covert communication
protocol.
http://www.symantec.com/connect/blogs/linux-back- door-uses-
covert-communication-protocol, 2013.
[122] Symantec Corp. Symantec Statement Regarding New York
Times Cyber Attack. http://www.symantec.com/connect/blogs/
symantec- statement-regarding-new-york-times-cyber-attack,
2013.
[123] P. Szor. The Art of Computer Virus Research and Defense.
Addison-Wesley Professional, 2005.
[124] K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and
Evaluation of a Real-Time URL Spam Filtering Service. In Proc. of the
IEEE Symposium on Security and Privacy, 2011.
[125] TrendLabs APT Research Team. Spear-Phishing Email: Most
Favored APT Attack Bait. Technical report, Trend Micro Incorporated,
2012.
[126] A. Vasudevan and R. Yerraballi. Cobra: Fine-grained malware
analysis using stealth localized-executions. In Proceedings of 2006
IEEE Symposium on Security and Privacy (Oakland.06, 2006.
[127] Verizon RISK Team. 2013 Data Breach Investigations Report.
Technical report, Verizon, 2013.
University of Birmingham | CPNI.gov.uk PAGE 37
Command & Control: Understanding, Denying and Detecting FEBRUARY 2014
Bibliography
[128] R. Villamar 1n-Salomo n and J. C. Brustoloni. Bayesian bot
detection based on dns traffic similarity. In SAC 09: Proceedings of
the 2009 ACM symposium on Applied Computing, pages 2035 2041,
New York, NY, USA, 2009. ACM.
[129] N. Villeneuve, N. Moran, and T. Haq. Evasive Tactics: Taidoor.
http: //www.fireeye.com/blog/technical/2013/09/evasive- tactics-
taidoor-3.html, 2013.
[130] Q. Wang, X. Gong, G. T. Nguyen, A. Houmansadr, and N.
Borisov. Censorspoofer: asymmetric communication using ip spoofing
for censorship-resistant web browsing. In Proceedings of the 2012
ACM conference on Computer and communications security, 2012.
[131] Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S.
Cheung, F. Wang, and D. Boneh. Stegotorus: a camouflage proxy
for the tor anonymity system. In Proceedings of the 2012 ACM
conference on Computer and communications security, 2012.
[132] C. Wisniewski. Twitter botnet command and control captured.
http://nakedsecurity.sophos.com/2010/05/18/twitter- botnet-
command-control-captured/, 2010.
[133] K. Xu, P. Butler, S. Saha, and D. Yao. DNS for Massive-Scale
Command and Control. IEEE Transactions on Dependable and Secure
Computing, 10(3), 2013.
[134] ydklijnsma. Large botnet cause of recent Tor network overload.
http://blog.fox-it.com/2013/09/05/large-botnet-cause- of-recent-
tor-network-overload/, 2013.
[135] T.-F. Yen and M. K. Reiter. Traffic aggregation for malware
detection. In DIMVA 08: Proceedings of the 5th international
conference on Detection of Intrusions and Malware, and Vulnerability
Assessment, pages 207 227, Berlin, Heidelberg, 2008. Springer-
Verlag. [ Pobierz całość w formacie PDF ]