Whitepapers and presentations
Title | Author | Language | Date | File |
Botnet construction, control and concealment | Krogoth | EN | 2008-March | |
RBN 'Rizing' - Abdallah Internet Hizmetleri | DigitalNinja - dn1nj4 | EN | February 29, 2008 | |
RBN As a Business Network - Clarifying the guesswork of Criminal Activity | Pheh | EN | January 6, 2008 | |
'Fuzzy Clarity' - Using Fuzzy Hashing Techniques to Identify Malicious Code | DigitalNinja - dn1nj4 | EN | April 25, 2007 | |
Modern Computer Viruses | Chas Tomlin | EN | 2006 | HTML |
Botnets: Proactive System Defense | John C. A. Bambenek | EN | 2006 | PPT |
Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines | Crandell, Wassermann, de Oliveira, Su, Wu, Chong | EN | October 26, 2006 | |
Understanding the Network-level Behavior of Spammers | Anirudh Ramachandran, Nick Feamster | EN | 2006 | |
Revealing Botnet Membership using DNSBL Counter-Intelligence | Anirudh Ramachandran, Nick Feamster, David Dagon | EN | 2006 | |
An Inside Look at Botnets | Paul Barford, Vinod Yegneswaran | EN | 2006 | |
Botnets as a Vehicle for Online Crime | Nicholas Ianelli, Aaron Hackworth CERT/CC | EN | December 1, 2005 | |
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks | Felix C. Freiling, Thorsten Holz, Georg Wicherski | EN | April 2005 | |
Know your Enemy: Tracking Botnets | The Honeynet Project & Research Alliance | EN | March 13, 2005 | HTML |
Detecting Mass-Mailing Worm Infected Hosts by Mining DNS Traffic Data | Ishibashi, Toyono, Toyama NTT Corporation | EN | 2005 | |
PHP.HOP - PHP Honeypot Project | Laurent Oudot | EN | Unknown | |
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses | Jayanthkumar Kannan, Karthik Lakshminarayanan | EN | Fall 2003 | |
Hacking Second Life | Michael Thumann, ERNW | EN | February, 2008 |
<< Viruses | Knowledge Base | Links >>