2008 Second International Conference on Emerging Security Information, Systems and Technologies 2008
DOI: 10.1109/securware.2008.44
|View full text |Cite
|
Sign up to set email alerts
|

The Automatic Discovery, Identification and Measurement of Botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…This is the initial phase where researcher may get the possibilities of any malicious activities specific to the botnet. Castle et al [45] showed a novel technique for the automatic Dacier et al [46] showed the attack attribution method. This method exhibits some real world result traces in low interaction honeypot.…”
Section: Botnet Forensic Identificationmentioning
confidence: 99%
“…This is the initial phase where researcher may get the possibilities of any malicious activities specific to the botnet. Castle et al [45] showed a novel technique for the automatic Dacier et al [46] showed the attack attribution method. This method exhibits some real world result traces in low interaction honeypot.…”
Section: Botnet Forensic Identificationmentioning
confidence: 99%
“…Castle and Buckley [17] presented a technique to detect spam botnets. At first, they extract the header information from an email message and enhance it with information from the envelope to generate a set of synthetic headers.…”
Section: Related Workmentioning
confidence: 99%
“…Castle and Buckley [7] present a technique to detect botnets that are used for sending spam. They process the headers of email messages and generate a set of synthetic headers from them.…”
Section: Related Workmentioning
confidence: 99%