Sciweavers

11 search results - page 1 / 3
» Evaluating email's feasibility for botnet command and contro...
Sort
View
DSN
2008
IEEE
13 years 11 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
DIMVA
2010
13 years 6 months ago
Evaluating Bluetooth as a Medium for Botnet Command and Control
Abstract. Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, man...
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Tr...
ICETE
2004
253views Business» more  ICETE 2004»
13 years 6 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
NSDI
2008
13 years 6 months ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...
SIGCOMM
2006
ACM
13 years 10 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster