WaitForSingleObject)(hStopEvent, 0) != WAIT_TIMEOUT)breakMemory allocaTon. 178 DWORD dwReaded = WININET_BUFFER_SIZE; 179 if(!Mem::reallocEx(&pDownloaded, dwDownloaded + dwReaded))break InternetReadFile)(hRequest, pDownloaded + dwDownloaded, dwReaded, &dwReaded))break, for, vol.32, issue.184, pp.174-175 ,
A Novel Traceback Approach for Direct and Reflected ICMP Attacks, 2011 Conference on Network and Information Systems Security, pp.1-5, 2011. ,
DOI : 10.1109/SAR-SSI.2011.5931380
Privacy-preserving domain-flux botnet detection in a large scale network, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp.7-10, 2013. ,
DOI : 10.1109/COMSNETS.2013.6465572
Collaborative Approach for Interdomain Botnet Detection in Large-scale Networks, Collaborative Computing : Networking, Applications and Worksharing (Collaboratecom), 2013 9th International Conference Conference on, pp.279-288 ,
Microsoft security intelligence report july-december 2012, 2013. ,
Ip traceback : a new denial-of-service deterrent ? Security Privacy, IEEE, vol.1, issue.3, pp.24-31, 2003. ,
Atrivo?cyber crime usa, 2008. ,
Building a dynamic reputation system for dns, USE- NIX Security Symposium, pp.273-290, 2010. ,
From throw-away traffic to bots : detecting the rise of dga-based malware, Proceedings of the 21st USENIX conference on Security symposium, pp.24-24, 2012. ,
Highly resilient peer-to-peer botnets are here : An analysis of gameover zeus The Americas, Malicious and Unwanted SoftwareMALWARE), 2013 8th International Conference on, pp.116-123, 2013. ,
ANSARI : On ip traceback, Communications Magazine IEEE, issue.7, pp.41142-153, 2003. ,
Ip traceback with deterministic packet marking, Communications Letters IEEE, vol.7, issue.4, pp.162-164, 2003. ,
A proposal for icmp traceback messages, ICMP Traceback Working Group, 2000. ,
Botnets-the silent threat, European Network and Information Security Agency (ENISA), p.171, 2007. ,
Exposure : Finding malicious domains using passive dns analysis, NDSS, 2011. ,
BLOOM : Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, pp.485-509, 2004. ,
DOI : 10.1080/15427951.2004.10129096
On the analysis of the zeus botnet crimeware toolkit, Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on, pp.31-38, 2010. ,
Fighting botnets with sinkholes, Network Security, issue.8, pp.201212-201227, 2012. ,
01 smurf ip denial-of-service attacks, 1998. ,
A proposal to prevent click-fraud using clickable captchas, Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability Companion, pp.62-67, 2012. ,
Measuring pay-per-install : The commoditization of malware distribution, USE- NIX Security Symposium, 2011. ,
The zombie roundup : Understanding, detecting, and disrupting botnets, Proceedings of the USENIX SRUTI Workshop, p.44, 2005. ,
Botnet detection by monitoring group activities in dns traffic, Computer and Information Technology 7th IEEE International Conference on, pp.715-720, 2007. ,
Spyeye bot versus zeus bot [cry] Cryptolocker creeps lure victims with fake adobe, microsoft activation codes, 2010. ,
Behavioral patterns of fast flux service networks, System Sciences (HICSS), 2010 43rd Hawaii International Conference on, pp.1-9, 2010. ,
An algebraic approach to ip traceback, ACM Transactions on Information and System Security (TISSEC), vol.5, issue.2, pp.119-137, 2002. ,
So you want to take over a botnet, Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats, pp.6-6, 2012. ,
Analysis of a/0 stealth scan from a botnet, Proceedings of the 2012 ACM conference on Internet measurement conference, pp.1-14, 2012. ,
Analyzing the aftermath of the mccolo shutdown, Applications and the Internet, 2009. SAINT'09. Ninth Annual International Symposium on, pp.157-160, 2009. ,
Rfc2827 (bcp38) : Network ingress filtering : Defeating denial of service attacks which employ ip source address spoofing. ietf, 2000. ,
Denial of service attack and defense schemes analysis and taxonomy, 3rd International Conference : Sciences of Electronics Technologies of Information and Telecomm, 2005. ,
Conficker working group : Lessons learned, 2011. ,
Manufacturing compromise : the emergence of exploit-as-a-service, Proceedings of the 2012 ACM conference on Computer and communications security, pp.821-832, 2012. ,
Rishi : Identify bot contaminated hosts by irc nickname evaluation, Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp.8-8, 2007. ,
Collaborative approach for inter-domain botnet detection in large-scale networks, Collaborative Computing : Networking, Applications and Worksharing (Collaboratecom ), 2013 9th International Conference Conference on, pp.279-288, 2013. ,
Privacypreserving domain-flux botnet detection in a large scale network, Communication Systems and Networks (COMSNETS), 2013 Fifth International Conference on, pp.1-9, 2013. ,
Ddos attacks in h2 2011, Kaspersky Securelist, 2012. ,
Taking down botnets, Network Security, vol.2011, issue.5, pp.13-15, 2011. ,
Bothunter : Detecting malware infection through ids-driven dialog correlation, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, p.12, 2007. ,
Botminer : Clustering analysis of network traffic for protocol-and structure-independent botnet detection, USENIX Security Symposium, pp.139-154, 2008. ,
A novel traceback approach for direct and reflected icmp attacks, Network and Information Systems Security (SAR-SSI), 2011 Conference on, pp.1-5, 2011. ,
Détection de botnets domain-flux dans un réseau à large échelle, Network and Information Systems Security (SAR-SSI), 2012 Conference on, 2012. ,
Peer-to-peer botnets : Overview and case study, Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp.1-1, 2007. ,
Botsniffer : Detecting botnet command and control channels in network traffic, Proceedings of the 15th Annual Network and Distributed System Security Symposium, NDSS, 2008. ,
Analyse et traçabilité des attaques smurf, 2010. ,
Measuring and detecting fast-flux service networks, NDSS, 2008. ,
Malicious automatically generated domain name detection using stateful-sbb, Applications of Evolutionary Computation, pp.529-539, 2013. ,
A short visit to the bot zoo [malicious bots software]. Security & Privacy, IEEE, vol.3, issue.3, pp.76-79, 2005. ,
Measurements and mitigation of peer-to-peer-based botnets : A case study on storm worm, pp.1-9, 2008. ,
Botnets as a vehicle for online crime, CERT Coordination Center, vol.1, p.28, 2005. ,
Srizbi botnet sending over 60 billion spams a day ,
Identifying suspicious activities through dns failure graph analysis, Network Protocols (ICNP) 18th IEEE International Conference on, pp.144-153, 2010. ,
Jackstraws : Picking command and control connections from bot traffic, USENIX Security Symposium, 2011. ,
IKONOMOU : Study on data collection and storage in the eu, 2012. ,
Ping of death, Insecure. org, 1996. ,
Single packet ip traceback in as-level partial deployment scenario, International Journal of Security and Networks, vol.2, issue.1, pp.95-108, 2007. ,
Social network-based botnet command-and-control : emerging threats and countermeasures, Applied Cryptography and Network Security, pp.511-528, 2010. ,
Wide-scale botnet detection and characterization, Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007. ,
Smurf-based distributed denial of service (ddos) attack amplification in internet, Internet Monitoring and Protection Second International Conference on, pp.25-25, 2007. ,
A comparative study of cyberattacks, Communications of the ACM, vol.55, issue.3, pp.66-73, 2012. ,
The new front line : Estonia under cyberassault, IEEE, vol.5, issue.4, pp.76-79, 2007. ,
Anatomy of the Mega-D takedown, Network Security, vol.2009, issue.12, pp.4-7, 2009. ,
DOI : 10.1016/S1353-4858(10)70005-2
Genetic-based real-time fast-flux service networks detection, Computer Networks, vol.57, issue.2, pp.501-513, 2013. ,
An introduction to Hacking and Crimeware : A Pocket Guide, 2012. ,
Towards collaborative security and p2p intrusion detection, Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC, pp.333-339, 2005. ,
Clustering botnet communication traffic based on n-gram feature selection, Computer Communications, vol.34, issue.3, pp.502-514, 2011. ,
Distributed denial of service attacks, Systems, Man, and Cybernetics IEEE International Conference on, pp.2275-2280, 2000. ,
Lessons learned while sinkholing botnets? not as easy as it looks !, Proceedings of the 21st Virus Bulletin International Conference, pp.106-110 ,
Large-scale ip traceback in highspeed internet : Practical techniques and theoretical foundation, Security and Privacy Proceedings. 2004 IEEE Symposium on, pp.115-129, 2004. ,
Know your enemy : Containing conficker. The Honeynet Project, 2009. ,
Using machine learning technliques to identify botnet traffic, Local Computer Networks, Proceedings 2006 31st IEEE Conference on, pp.967-974, 2006. ,
Proactive botnet countermeasures?an offensive approach. The Virtual Battlefield : Perspectives on Cyber Warfare, pp.211-225, 2009. ,
Botnet : Classification, attacks, detection, tracing, and preventive measures, 2009. ,
Procédé de ralentissement d'une communication dans un réseau ,
On design and evaluation of, Computer Communications and Networks Proceedings. Tenth International Conference on, pp.159-165, 2001. ,
A taxonomy of ddos attack and ddos defense mechanisms, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.39-53, 2004. ,
Beheading hydras : performing effective botnet takedowns, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp.121-132, 2013. ,
Blackenergy ddos bot analysis, Arbor, 2007. ,
Georgia ddos attacks-a quick summary of observations. arbor Sert (Security engineering and response team, p.12, 2008. ,
As the net churns : Fast-flux botnet observations, Malicious and Unwanted Software 3rd International Conference on Rfc 1459 : Internet relay chat protocol, pp.24-31, 1993. ,
Internet relay chat protocol, 1993. ,
Scalable fine-grained behavioral clustering of http-based malware, Computer Networks, 2012. ,
An analysis of using reflectors for distributed denial-ofservice attacks, ACM SIGCOMM Computer Communication Review, vol.31, issue.3, pp.38-47, 2001. ,
Case study of the miner botnet, Cyber Conflict (CYCON), 2012 4th International Conference on, pp.1-16, 2012. ,
Behavioral clustering of http-based malware and signature generation using malicious network traces, NSDI, pp.391-404, 2010. ,
Internet control message protocol, 1981. ,
The ddos that knocked spamhaus offline (and how we mitigated it), 2013. ,
Attacks by anonymous wikileaks proponents not anonymous, 2010. ,
Rfc 1122 : Requirements for internet hosts ? communication layers ,
Revealing botnet membership using dnsbl counter-intelligence, Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet, pp.49-54, 2006. ,
Analysis of the kraken botnet, 2008. ,
On the reverse engineering of the citadel botnet, Foundations and Practice of Security, pp.408-425, 2014. ,
Insights from the analysis of the mariposa botnet, Risks and Security of Internet and Systems (CRiSIS), 2010 Fifth International Conference on, pp.1-9, 2010. ,
Dids (distributed intrusion detection system)-motivation, architecture, and an early prototype, Proceedings of the 14th national computer security conference, pp.167-176, 1991. ,
Dissecting spyeyeunderstanding the design of third generation botnets, Computer Networks, 2012. ,
Rfc 2644 : Changing the default for directed broadcast in routers ,
VIGNA : Your botnet is my botnet : analysis of a botnet takeover, Proceedings of the 16th ACM conference on Computer and communications security, pp.635-647, 2009. ,
The underground economy of spam : A botmaster's perspective of coordinating large-scale spam campaigns, USENIX Workshop on Large- Scale Exploits and Emergent Threats (LEET), 2011. ,
Lessons in botnets : The after-effects of isp takedowns, 2010. ,
Botnet detection based on network behavior, Botnet Detection, pp.1-24 ,
Internet study, IPOQUE Report, vol.37, pp.351-362, 2008. ,
Malicious icmp tunneling : Defense against the vulnerability, Information Security and Privacy, pp.226-236, 2003. ,
Advanced and authenticated marking schemes for ip traceback, INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings . IEEE, pp.878-886, 2001. ,
Honeypots : Definitions and value of honeypots, 2003. ,
Hashbased ip traceback, In ACM SIGCOMM Computer Communication Review, vol.31, pp.3-14, 2001. ,
The underground economy of fake antivirus software, Proceedings of the Workshop on Information Security, 2011. ,
Botnets : A survey, Computer Networks, 2012. ,
Practical network support for ip traceback, ACM SIGCOMM Computer Communication Review, vol.30, issue.4, pp.295-306, 2000. ,
Detecting botnets with tight command and control, Local Computer Networks , Proceedings 2006 31st IEEE Conference on, pp.195-202, 2006. ,
Koobface : The evolution of the social botnet, In eCrime Researchers Summit, pp.1-10, 2010. ,
Netstat : A network-based intrusion detection system, Journal of Computer Security, vol.7, issue.1, pp.37-71, 1999. ,
Automatically generating models for botnet detection, Computer Security?ESORICS 2009, pp.232-249, 2009. ,
Collaboration-based botnet detection architecture, Intelligent Computation Technology and Automation, 2009. ,
A denial-of-service-resistant IP traceback approach, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769), pp.351-356, 2004. ,
DOI : 10.1109/ISCC.2004.1358429
Fit : fast internet traceback, INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, pp.1395-1406, 2005. ,
Winning with dns failures : Strategies for faster botnet detection, Security and Privacy in Communication Networks, volume 96 de Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp.446-459, 2012. ,
Detecting algorithmically generated malicious domain names, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.48-61, 2010. ,
DOI : 10.1145/1879141.1879148
Revealing packed malware, IEEE, vol.6, issue.5, pp.65-69, 2008. ,
A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, vol.29, issue.1, pp.124-140, 2010. ,
Boosting the scalability of botnet detection using adaptive traffic sampling, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp.124-134, 2011. ,
Botnet detection through fine flow classification. unpublished, 2011. ,