Back to Results
First PageMeta Content
Spamming / Cyberwarfare / Botnets / Denial-of-service attacks / Denial-of-service attack / Fast flux / Storm Worm / Agobot / Internet Relay Chat / Computer network security / Computing / Multi-agent systems


Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods Elizabeth Stinson Stanford University John C. Mitchell
Add to Reading List

Document Date: 2010-03-09 22:02:42


Open Document

File Size: 314,35 KB

Share Result on Facebook

City

Extrusion / A.2 Host / A.1 Network / /

Company

Local Computer Networks / Google / /

Event

Product Issues / FDA Phase / /

Facility

IRC port / Spam Campaign Trail / /

IndustryTerm

communications encryption / chine learning algorithms / Internet Worm / similar communications / similar communications activity / communications-plane clustering / detection algorithm / hub server / botnet communications / internal network / /

Organization

Tight Command / Stanford University / /

Person

G. M. Voelker / V / P. Porras / V / John C. Mitchell / Dan Boneh / Collin Jackson / Guofei Gu / Chars Time Net-Det / Phil Porras / Lorenzo Worm / Adam Barth / J. B. Grizzard / V / /

Position

model for IRC / candidate control flows / Miner / command interpreter / candidate control conversation ing / representative / bot writer / /

Product

E3 / Hosts / data Attack time thresholds Inject packet / /

Technology

encryption / C&C protocol / DNS / Clustering algorithms / Peer-to-Peer / C&C-communication-protocol processor / command interpreter / P2P / same transport layer A.1 Network-Based protocol / chine learning algorithms / communications encryption / UDP / TCP/IP / detection algorithm / /

SocialTag