Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science.  Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.
Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science. Botnet Detection Based on Network Behavior
1(24)
W. Timothy Strayer
David Lapsely
Robert Walsh
Carl Livadas
Honeynet-based Botnet Scan Traffic Analysis
25(20)
Zhichun Li
Anup Goyal
Yan Chen
Characterizing Bots' Remote Control Behavior
45(20)
Elizabeth Stinson
John C. Mitchell
Automatically Identifying Trigger-based Behavior in Malware
65(24)
David Brumley
Cody Hartwig
Zhenkai Liang
James Newsome
Dawn Song
Heng Yin
Towards Sound Detection of Virtual Machines
89(28)
Jason Franklin
Mark Luk
Jonathan M. McCune
Arvind Seshadri
Adrian Perrig
Leendert van Doorn
Botnets and Proactive System Defense
117(14)
John Bambenek
Agnes Klus
Detecting Botnet Membership with DNSBL Counterintelligence
131(12)
Anirudh Ramachandran
Nick Feamster
David Dagon
A Taxonomy of Botnet Structures
143
David Dagon
Guofei Gu
Christopher P. Lee