Whitepapers and presentations

Title Author Language Date File
Botnet construction, control and concealment Krogoth EN 2008-March PDF
RBN 'Rizing' - Abdallah Internet Hizmetleri DigitalNinja - dn1nj4 EN February 29, 2008 PDF
RBN As a Business Network - Clarifying the guesswork of Criminal Activity Pheh EN January 6, 2008 PDF
'Fuzzy Clarity' - Using Fuzzy Hashing Techniques to Identify Malicious Code DigitalNinja - dn1nj4 EN April 25, 2007 PDF
Modern Computer Viruses Chas Tomlin EN 2006 HTML
Botnets: Proactive System Defense John C. A. Bambenek EN 2006 PPT
Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines Crandell, Wassermann, de Oliveira, Su, Wu, Chong EN October 26, 2006 PDF
Understanding the Network-level Behavior of Spammers Anirudh Ramachandran, Nick Feamster EN 2006 PDF
Revealing Botnet Membership using DNSBL Counter-Intelligence Anirudh Ramachandran, Nick Feamster, David Dagon EN 2006 PDF
An Inside Look at Botnets Paul Barford, Vinod Yegneswaran EN 2006 PDF
Botnets as a Vehicle for Online Crime Nicholas Ianelli, Aaron Hackworth CERT/CC EN December 1, 2005 PDF
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks Felix C. Freiling, Thorsten Holz, Georg Wicherski EN April 2005 PDF
Know your Enemy: Tracking Botnets The Honeynet Project & Research Alliance EN March 13, 2005 HTML
Detecting Mass-Mailing Worm Infected Hosts by Mining DNS Traffic Data Ishibashi, Toyono, Toyama NTT Corporation EN 2005 PDF
PHP.HOP - PHP Honeypot Project Laurent Oudot EN Unknown PDF
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses Jayanthkumar Kannan, Karthik Lakshminarayanan EN Fall 2003 PDF
Hacking Second Life Michael Thumann, ERNW EN February, 2008 PDF

<< Viruses | Knowledge Base | Links >>