Detecting malicious activity with DNS backscatter over time

K Fukuda, J Heidemann… - IEEE/ACM Transactions on …, 2017 - ieeexplore.ieee.org
Network-wide activity is when one computer (the originator) touches many others (the
targets). Motives for activity may be benign (mailing lists, content-delivery networks, and …

Detecting Malicious Activity With DNS Backscatter Over Time

K Fukuda, J Heidemann, A Qadeer - IEEE/ACM Transactions on …, 2017 - computer.org
Network-wide activity is when one computer (the originator) touches many others (the
targets). Motives for activity may be benign (mailing lists, content-delivery networks, and …

[PDF][PDF] Detecting Malicious Activity With DNS Backscatter Over Time

K Fukuda, J Heidemann, A Qadeer - IEEE/ACM TRANSACTIONS ON …, 2017 - fukuda-lab.org
Network-wide activity is when one computer (the originator) touches many others (the
targets). Motives for activ-ity may be benign (mailing lists, content-delivery networks, and …

Detecting Malicious Activity With DNS Backscatter Over Time

K Fukuda, J Heidemann, A Qadeer, K Fukuda… - IEEE/ACM Transactions …, 2017 - dl.acm.org
Network-wide activity is when one computer the originator touches many others the targets.
Motives for activity may be benign mailing lists, content-delivery networks, and research …

[引用][C] Detecting Malicious Activity With DNS Backscatter Over Time

K Fukuda, J Heidemann, A Qadeer - IEEE/ACM Transactions on …, 2017 - cir.nii.ac.jp
Detecting Malicious Activity With DNS Backscatter Over Time | CiNii Research CiNii 国立情報学
研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データをさがす 大学 …

[PDF][PDF] Detecting Malicious Activity With DNS Backscatter Over Time

K Fukuda, J Heidemann, A Qadeer - academia.edu
Network-wide activity is when one computer (the originator) touches many others (the
targets). Motives for activ-ity may be benign (mailing lists, content-delivery networks, and …

[PDF][PDF] Detecting Malicious Activity With DNS Backscatter Over Time

K Fukuda, J Heidemann, A Qadeer - academia.edu
Network-wide activity is when one computer (the originator) touches many others (the
targets). Motives for activ-ity may be benign (mailing lists, content-delivery networks, and …