- E. Stinson and J. C. Mitchell, “Characterizing the Remote Control Behavior of Bots,” Lecture Notes in Computer Science, vol. 4579, p. 20, 2007.
- C. J. Dietrich, “Identification and Recognition of Remote-Controlled Malware,” master, computer science, mannheim, 2013.
- G. Fedynyshyn, M. C. Chuah, and G. Tan, “Detection and Classification of Different Botnet C&C Channels,” in Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings, J. M. A. Calero, L. T. Yang, F. G. Marmol, L. J. Garcia Villalba, A. X. Li, and Y. Wang, Eds., ed Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 228-242, 2011.
- S. Ashutosh, “Social networking for botnet command and control,” master Project, Computer Science, San Jose State University, 2012.
- J. Goebel and T. Holz, “Rishi: identify bot contaminated hosts by IRC nickname evaluation,” presented at the HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets CA, USA, 2007.
- S. Shah and V. M. Lomte, “The Survey Paper on ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P,” International Journal of Science and Research (IJSR), vol. 3, p. 6, December 2014.
- P. Jaikumar and A. C. Kak, “A graph-theoretic framework for isolating botnets in a network,” Security and Communication Networks, vol. 8, p. 19, 28 February 2012.
- S. Chang and T. E. Daniels, “P2P botnet detection using behavior clustering & statistical tests,” 2nd ACM workshop on Security and artificial intelligence, p. 8, 2009.
- P. Wang, S. Sparks, and C. C. Zou, “An Advanced Hybrid Peer-to-Peer Botnet,” IEEE Transactions on Dependable and Secure Computing, vol. 7, p. 113, 2010.
- A. blue, Hooks, 2011. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ms632589%28v=vs.85%29.aspx
- M. Russinovich and D. A. Solomon, “Windows Internals Part 1: Microsoft,” 2012.
- B. Blunden, “The Rootkit Arsenal: WordWar,” 2009.
- Microsoft, Filter Drivers, 2015. Available: https://msdn.microsoft.com/en-us/library/windows/hardware/ff545890%28v=vs.85%29.aspx
- R. Mark. Autoruns for Windows, 2015. Available: https://technet.microsoft.com/en-us/sysinternals/bb963902.aspx
- J. Binkley and S. Singh, “An algorithm for anomaly-based botnet detection,” In: Proc. Reducing Unwanted Traffic on the Internet, 2007. Available: http://static.usenix.org/events/sruti06/tech/full_papers/binkley/binkley_html/
- P. P. G. Gu, V. Yegneswaran, and M. Fong, “BotHunter: Detecting malware infection through ids-driven dialog correlation,” 2007. Available: http://static.usenix.org/legacy/events/sec07/tech/full_papers/gu/gu_html/
- G. Gu, R. Perdisci, J. Zhang, and W. Lee, “BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection,” USENIX Security Symposium, 2008.
- G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic,” presented at the Computer Science and Engineering Faculty Publications, 2008.
- M. P. Collins and M. K. Reiter, “Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs,” Software Engineering Institute p. 20, September 2007.
- X. Hu and M. Knysz, “Rb-seeker: Auto-detection of redirection botnets,” presented at the Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA, 2009.
- M. P. Collins, “Using uncleanliness to predict future botnet addresses,” presented at the 7th ACM SIGCOMM conference on Internet measurement 2007.
- A. Karasaridis and B. Rexroad, “Wide-scale botnet detection and characterization,” presented at the HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets CA, USA, 2007.
- E. Cooke, “The Zombie roundup: understanding, detecting, and disrupting botnets,” presented at the SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet, CA, USA, 2005.
- E. Stinson and J. C. Mitchell, “Characterizing Bots’ Remote Control Behavior,” presented at the 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007
- C. Yan, T. D. Dimitriou, and J. Zhou, “Using Failure Information Analysis to Detect Enterprise Zombies,” presented at the 5th International ICST Conference, Greece, Athens, Secure Comm. 2009.
- K. Singh, A. Srivastava, J. Giffin, and W. Lee, “Evaluating email’s feasibility for botnet command and control,” presented at the Dependable Systems and Networks with FTCS and DCC, DSN 2008, IEEE International Conference on, 2008.
- Y. Zhao, Y. Xie, and F. Yu, “BotGraph: Large Scale Spamming Botnet Detection” The 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), April 1, 2009 2009.
- L. Zhuang, J. Dunagan, and D. R. Simon, “Characterizing botnets from email spam records,” presented at the LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, CA, USA, 2008.
- Y. Xie, F. Yu, and R. Panigrahy, “Spamming Botnet: Signatures and Characteristics,” presented at the ACM SIGCOMM 2008, Seattle, WA USA, 2008.
- S. Poland, “How to create a twitter bot,” 2007. Available: http://blog.stevepoland.com/how-to-create-a-twitter-bot
- DigiNinja, Kreiosc2: Poc using twitter as its command and control channel, 2008. Available: http://www.digininja.org
- J. P. John, A. Moshchuk, and S. D. Gribble, “Studying spamming botnets using Botlab,” Presented at the NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation CA, USA, 2009.
- F. S. Inc, “Web security trends report q4 .Technical report,” 2007. Available: http://www.finjan.com/Content.aspx?id=827
- J. Baltazar, J. Costoya, and R. Flores, “The Real Face of KOOBFACE: The Largest Web 2.0 Botnet Explained,” Trend Micro Threat Research, p. 18, 2009.
- T. Easton and K. Johnson, “Social zombies,” presented at the DEFCON, CA, USA, 2009.
- V. S. M. D. Base, “Virus Sign Malware Data Base,” Ed, 2014.
- C. SandBox, “CW_Sand Box Data,” 2014. Available: http://pi1.informatik.uni-mannheim.de/malheur/
|