R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name, comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the …
Time zones play an important and unexplored role in malware epidemics. To understand how time and location affect malware spread dynamics, we studied botnets, or large …
D Dagon, G Gu, CP Lee, W Lee - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (eg, spam, ddos). Using …
SE Schechter, J Jung, AW Berger - … September 15-17, 2004. Proceedings 7, 2004 - Springer
Worm detection and response systems must act quickly to identify and quarantine scanning worms, as when left unchecked such worms have been able to infect the majority of …
CC Zou, W Gong, D Towsley… - IEEE/ACM Transactions …, 2005 - ieeexplore.ieee.org
After many Internet-scale worm incidents in recent years, it is clear that a simple self- propagating worm can quickly spread across the Internet and cause severe damage to our …
BK Mishra, N Jha - Applied Mathematical Modelling, 2010 - Elsevier
Susceptible (S)–exposed (E)–infectious (I)–quarantined (Q)–recovered (R) model for the transmission of malicious objects in computer network is formulated. Thresholds, equilibria …