Check out the new USENIX Web site. next up previous
Next: About this document ... Up: : Previous: Acknowledgments


Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, and Felix Freiling.
The Nepenthes Platform: An Efficient Approach to Collect Malware.
In Proceedings of the $ 9^{th}$ International Symposium on Recent Advances in Intrusion Detection (RAID), September 2006.

Paul Barford and Vinod Yagneswaran.
An Inside Look at Botnets.
Advances in Information Security. Springer, 2007.

Martin Casado and Michael Freedman.
Peering through the shroud: The effect of edge opacity on IP-based client authentication.
In Proceedings of $ 4^{th}$ USENIX Symposium on Networked Systems Design and Implementation (NDSI), April 2007.

Evan Cooke, Farnam Jahanian, and Danny McPherson.
The Zombie Roundup: Understanding, Detecting, and Disturbing Botnets.
In Proceedings of the first Workshop on Steps to Reducing Unwanted Traffic on the Internet, July 2005.

David Dagon, Cliff Zou, and Wenke Lee.
Modeling Botnet Propagation Using Time Zones.
In Proceedings of the $ 13^{th}$ Network and Distributed System Security Symposium NDSS, February 2006.

DNS Cache Snooping or Snooping the Cache for Fun and Profit.
Available at:

Felix Freiling, Thorsten Holz, and Georg Wicherski.
Botnet Tracking: Exploring a root-cause methodology to prevent denial-of-service attaks.
In Proceedings of $ 10^{th}$ European Symposium on Research in Computer Security, ESORICS, September 2005.

Allen Householder and Roman Danyliw.
Increased Activity Targeting Windows Shares.
Technical Report CA-2003-08, CERT, 2003.

Farnam Jahanian.
Enter the Botnet: An Introduction to the Post-Worm Era.
ARO-DARPA-DHS Special Workshop on Botnets, 2006.

Wenke Lee, Cliff Wang, and David Dagon.
Botnet Detection: Countering the Largest Security Threat.
Springer Verlag, July 2007.

John Markoff.
Attack of the Zombie Computers Is a Growing Threat, Experts Say.
In New York Times, January 2007.

Bill McCarty.
Botnets: Big and bigger.
IEEE Security and Privacy Magazine, 1(4):87-90, 2003.

Laurianne McLaughlin.
Bot software spreads, causes new worries.
IEEE Distributed Systems Online, June 2004.

Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis.
A Multifaceted Approach to Understanding the Botnet Phenomenon.
In Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (IMC), pages 41-52, Oct., 2006.

Anirudh Ramachandran, Nick Feamster, and David Dagon.
Revealing Botnet Membership using DNSBL Counter-Intelligence.
In Proceedings of the 2$ ^{nd}$ Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), July 2006.

L. Spitzner.
The Honeynet Project: Trapping the Hackers.
IEEE Security and Privacy Magazine, 1(2):15-23, 2003.

T. Sterling.
Prosecutors say Dutch suspects hacked 1.5 million computers world wide.
Associated Press, October 2005.

CNN Technology.
Expert: Botnets No. 1 emerging Internet threat. Online article, see

Cliff C. Zou and Ryan Cunningham.
Honeypot-Aware Advanced Botnet Construction and Maintenance.
In Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN), 2006.

Fabian Monrose 2007-04-03