Sciweavers

21 search results - page 5 / 5
» Topology Perturbation for Detecting Malicious Data Injection
Sort
View
ACSAC
2010
IEEE
12 years 9 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon