Uncovering large groups of active malicious accounts in online social networks

Q Cao, X Yang, J Yu, C Palow - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
The success of online social networks has attracted a constant interest in attacking and
exploiting them. Attackers usually control malicious accounts, including both fake and …

[图书][B] Network security: A decision and game-theoretic approach

T Alpcan, T Başar - 2010 - books.google.com
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …

[PDF][PDF] Modeling Botnet Propagation Using Time Zones.

D Dagon, CC Zou, W Lee - NDSS, 2006 - cs.ucf.edu
Time zones play an important and unexplored role in malware epidemics. To understand
how time and location affect malware spread dynamics, we studied botnets, or large …

[图书][B] 计算机病毒与反病毒技术

张仁斌, 李钢, 侯整风 - 2006 - books.google.com
随着国家信息化步伐的加快和高等教育规模的扩大, 社会对计算机专业人才的需求不仅体现在
数量的增加上, 而且体现在质量要求的提高上, 培养具有研究和实践能力的高层次的计算机专业 …

A taxonomy of botnet structures

D Dagon, G Gu, CP Lee, W Lee - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We
propose key metrics to measure their utility for various activities (eg, spam, ddos). Using …

Fast detection of scanning worm infections

SE Schechter, J Jung, AW Berger - … September 15-17, 2004. Proceedings 7, 2004 - Springer
Worm detection and response systems must act quickly to identify and quarantine scanning
worms, as when left unchecked such worms have been able to infect the majority of …

The monitoring and early detection of internet worms

CC Zou, W Gong, D Towsley… - IEEE/ACM Transactions …, 2005 - ieeexplore.ieee.org
After many Internet-scale worm incidents in recent years, it is clear that a simple self-
propagating worm can quickly spread across the Internet and cause severe damage to our …

[HTML][HTML] SEIQRS model for the transmission of malicious objects in computer network

BK Mishra, N Jha - Applied Mathematical Modelling, 2010 - Elsevier
Susceptible (S)–exposed (E)–infectious (I)–quarantined (Q)–recovered (R) model for the
transmission of malicious objects in computer network is formulated. Thresholds, equilibria …