Driving in the cloud: an analysis of drive-by download operations and abuse reporting

作者: Antonio Nappa , M. Zubair Rafique , Juan Caballero

DOI: 10.1007/978-3-642-39235-1_1

关键词:

摘要: … We also include the IP address of the server, the first day we milked it, and pointers to public feeds … The report was forwarded to a customer and our ticket closed without waiting for the …

参考文章(35)
Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy, John P. John, Studying spamming botnets using Botlab networked systems design and implementation. pp. 291- 306 ,(2009)
Benjamin Zorn, Charles Curtsinger Benjamin Livshits, Christian Seifert, Zozzle: Low-overhead Mostly Static JavaScript Malware Detection ,(2010)
Panayiotis Mavrommatis, Niels Provos, Dean McNamee, Nagendra Modadugu, Ke Wang, The ghost in the browser analysis of web-based malware conference on workshop on hot topics in understanding botnets. pp. 4- 4 ,(2007)
Finding Groups in Data John Wiley & Sons, Inc.. ,(1990) , 10.1002/9780470316801
Vern Paxson, Chris Grier, Juan Caballero, Dawn Song, Chia Yuan Cho, Insights from the inside: a view of botnet management from infiltration usenix conference on large scale exploits and emergent threats. pp. 2- 2 ,(2010)
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov, Learning and Classification of Malware Behavior international conference on detection of intrusions and malware and vulnerability assessment. pp. 108- 125 ,(2008) , 10.1007/978-3-540-70542-0_6
Geoffrey M. Voelker, Chris Fleizach, Stefan Savage, David S. Anderson, Spamscatter: characterizing internet scam hosting infrastructure usenix security symposium. pp. 10- ,(2007)
Vern Paxson, Chris Grier, Juan Caballero, Christian Kreibich, Measuring pay-per-install: the commoditization of malware distribution usenix security symposium. pp. 13- 13 ,(2011)
D. Crocker, Mailbox Names for Common Services, Roles and Functions RFC. ,vol. 2142, pp. 1- 6 ,(1997)
Michalis Polychronakis, Panayiotis Mavrommatis, Niels Provos, Ghost turns zombie: exploring the life cycle of web-based malware LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. pp. 11- ,(2008)