Check out the new USENIX Web site. next up previous
Next: About this document ... Up: : Previous: Acknowledgments

Bibliography

1
Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, and Felix Freiling.
The Nepenthes Platform: An Efficient Approach to Collect Malware.
In Proceedings of the $ 9^{th}$ International Symposium on Recent Advances in Intrusion Detection (RAID), September 2006.

2
Paul Barford and Vinod Yagneswaran.
An Inside Look at Botnets.
Advances in Information Security. Springer, 2007.

3
Martin Casado and Michael Freedman.
Peering through the shroud: The effect of edge opacity on IP-based client authentication.
In Proceedings of $ 4^{th}$ USENIX Symposium on Networked Systems Design and Implementation (NDSI), April 2007.

4
Evan Cooke, Farnam Jahanian, and Danny McPherson.
The Zombie Roundup: Understanding, Detecting, and Disturbing Botnets.
In Proceedings of the first Workshop on Steps to Reducing Unwanted Traffic on the Internet, July 2005.

5
David Dagon, Cliff Zou, and Wenke Lee.
Modeling Botnet Propagation Using Time Zones.
In Proceedings of the $ 13^{th}$ Network and Distributed System Security Symposium NDSS, February 2006.

6
DNS Cache Snooping or Snooping the Cache for Fun and Profit.
Available at: https://www.sysvalue.com/papers/DNS-Cache-Snooping/files/DNS_Cache_Snooping_1.1.pdf.

7
Felix Freiling, Thorsten Holz, and Georg Wicherski.
Botnet Tracking: Exploring a root-cause methodology to prevent denial-of-service attaks.
In Proceedings of $ 10^{th}$ European Symposium on Research in Computer Security, ESORICS, September 2005.

8
Allen Householder and Roman Danyliw.
Increased Activity Targeting Windows Shares.
Technical Report CA-2003-08, CERT, 2003.

9
Farnam Jahanian.
Enter the Botnet: An Introduction to the Post-Worm Era.
ARO-DARPA-DHS Special Workshop on Botnets, 2006.

10
Wenke Lee, Cliff Wang, and David Dagon.
Botnet Detection: Countering the Largest Security Threat.
Springer Verlag, July 2007.

11
John Markoff.
Attack of the Zombie Computers Is a Growing Threat, Experts Say.
In New York Times, January 2007.

12
Bill McCarty.
Botnets: Big and bigger.
IEEE Security and Privacy Magazine, 1(4):87-90, 2003.

13
Laurianne McLaughlin.
Bot software spreads, causes new worries.
IEEE Distributed Systems Online, June 2004.

14
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis.
A Multifaceted Approach to Understanding the Botnet Phenomenon.
In Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (IMC), pages 41-52, Oct., 2006.

15
Anirudh Ramachandran, Nick Feamster, and David Dagon.
Revealing Botnet Membership using DNSBL Counter-Intelligence.
In Proceedings of the 2$ ^{nd}$ Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), July 2006.

16
L. Spitzner.
The Honeynet Project: Trapping the Hackers.
IEEE Security and Privacy Magazine, 1(2):15-23, 2003.

17
T. Sterling.
Prosecutors say Dutch suspects hacked 1.5 million computers world wide.
Associated Press, October 2005.

18
CNN Technology.
Expert: Botnets No. 1 emerging Internet threat. Online article, see https://edition.cnn.com/2006/TECH/internet/01/31/furst/index.html.

19
Cliff C. Zou and Ryan Cunningham.
Honeypot-Aware Advanced Botnet Construction and Maintenance.
In Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN), 2006.


Fabian Monrose 2007-04-03