REFERENCES
Balapure, A., Paganini, P., 2013. InfoSec Institute, Botnets Unearthed – The ZEUS BOT,
Available from,
http://resources.infosecinstitute.com/botnets-unearthed-the-zeus-bot/
(ac-
cessed 08.07.13).
Bilge, L., Kirda, E., Kruegel, C., and Balduzzi, M.; Institute Eurecom Sophia Antipolis,
Northeastern University Boston, University of California Santa Barbara. EXPOSURE:
Finding Malicious Domains Using Passive DNS Analysis, published in 18th Annual
Network & Distributed System Security Symposium Proceedings, NDSS 2011, 6–9
February 2011, San Diego, CA.
Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., Wang, L.,
2010. On the Analysis of the Zeus Botnet Crimeware Toolkit. published in Eighth Annual
International Conference on Privacy Security and Trust (PST), 17–19 August 2010,
Ottawa, ON.
Chang, S., Daniels, T.E.; Department of Electrical and Computer Engineering of Iowa State
University, Ames, Iowa. P2P Botnet Detection using Behavior Clustering & Statistical
Tests, published in Proceedings of the 2nd ACM workshop on Security and artificial intel-
ligence (AISec 2009), 16th ACM Conference on Computer and Communications Security
(CCS 2009), 9–13 November 2009, Hyatt Regency Chicago, Chicago, IL.
EC3, 2013. Europol’s European Cybercrime Centre (EC3) press release. Notorious bot-
net infecting 2 million computers Disrupted.
https://www.europol.europa.eu/content/
notorious-botnet-infecting-2-million-computers-disrupted
.
Falliere, N., Chien, E., 2009. Symantec White Paper. Zeus: King of the Bots, November 2009.
Ferguson, R., 2010. Trend Micro White Paper, The Botnet Chronicles, A journey to Infamy,
November 2010.
F-Secure Threat Report – Second half (H2) of 2012.
Gu, G., Zhang, J., Lee, W.; School of Computer Science, College of Computing Georgia
Institute of Technology Atlanta, GA. BotSniffer: Detecting Botnet Command and
Control Channels in Network Traffic, published in 16th Annual Network & Distributed
System Security Symposium Proceedings, NDSS 2008, 7–10 February 2008, San
Diego, CA.
Howard, F., 2012. Sophos White Paper, Exploring the Blackhole Exploit Kit, March 2012.
Kalige, E., Burkley, D., 2012. Versafe and Check Point software Technologies White
Paper. A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware,
Eran Kalige (Versafe), Darrell Burkey (Check Point Software Technologies),
December 2012.
Kartaltepe, E.J., Morales, J.A., Xu, S., Sandhu, R., June 2010. Institute for Cyber Security and
Department of Computer Science, University of Texas at San Antonio. In: Social Network-
Based Botnet Command-and-Control: Emerging Threats and Countermeasures, published
in 8th International Conference on Applied Cryptography and Network Security, ACNS
2010, 22-25 June 2010, Beijing, China.
Do'stlaringiz bilan baham: |