Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.

作者: David Dagon , Yacin Nadji , Manos Antonakakis , Yizheng Chen , Wenke Lee

DOI:

关键词:

摘要:

参考文章(11)
Dan Pelleg, Andrew W. Moore, X-means: Extending K-means with Efficient Estimation of the Number of Clusters international conference on machine learning. pp. 727- 734 ,(2000)
P. V. Mockapetris, Domain names - concepts and facilities RFC. ,vol. 1034, pp. 1- 31 ,(1987)
Paul Barford, Kevin Springborn, Impression fraud in online advertising via pay-per-view networks usenix security symposium. pp. 211- 226 ,(2013)
C. Rossow, D. Andriesse, T. Werner, B. Stone-Gross, D. Plohmann, C. J. Dietrich, H. Bos, SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets ieee symposium on security and privacy. pp. 97- 111 ,(2013) , 10.1109/SP.2013.17
Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang, Knowing your enemy Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 674- 686 ,(2012) , 10.1145/2382196.2382267
Tommy Blizard, Nikola Livic, Click-fraud monetizing malware: A survey and case study international conference on malicious and unwanted software. pp. 67- 72 ,(2012) , 10.1109/MALWARE.2012.6461010
Vacha Dave, Saikat Guha, Yin Zhang, Measuring and fingerprinting click-spam in ad networks acm special interest group on data communication. ,vol. 42, pp. 175- 186 ,(2012) , 10.1145/2342356.2342394
Richard Kemmerer, Christopher Kruegel, Giovanni Vigna, Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Your botnet is my botnet: analysis of a botnet takeover computer and communications security. pp. 635- 647 ,(2009) , 10.1145/1653662.1653738
Qing Zhang, Thomas Ristenpart, Stefan Savage, Geoffrey M. Voelker, Got traffic? Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality - WebQuality '11. pp. 19- 26 ,(2011) , 10.1145/1964114.1964119
P. V. Mockapetris, Domain names - implementation and specification Domain names - implementation and specification. ,vol. 1035, pp. 1- 55 ,(1987)