Bootnet Research Papers

1 comment

Buenas tardes noches dias como sean ahora venimos con unos Research Papers  nuevamente cai :| al hospital y esta sepsi entrada viene desde el móvil nuevamente solo que ahora esta es una buena recopilación de material referente a las bootnets.


Este material mas que todo nos ayuda a entender un poco la lógica de las redes zombies, que ultimamente aparecierón y la novedad que todos debieron de escuchar sobre Stuxnet, o como de conficker, cada paper de esta recopilación nos inunda de esta grata información.

Una pequeña muestra del material ya que tambien hay libros:

2002 - Yeung - Parzen-window network intrusion detectors.pdf
2003_kruegel_vigna_ccs03.pdf
2008--Nguyen_Armitage_SurveysAndTutorials2008.pdf
A behavioral approach to worm detection - Ellis - 2004.pdf
a brief history of malware.pdf
A comparison of machine learning techniques for phishing detection - Abu-Nimeh - 2007.pdf
A Cooperative Immunization System for an Untrusting Internet.pdf
Advanced poly.pdf
Aggressive Network Self-Defense (2005).pdf
Agobot_&_the_Kit-chen_Sink.pdf
Analysis, Extensions - 2008 - Acm ccs 2008.pdf
An approach to usable security based on event monitoring and visualization - Dourish - 2002.pdf
An Inside Look at Botnets.pdf
Practical Approach To Solving Performance Problems with SAS{\textregistered} - Brown.pdf
Arrieta, Marina - Unknown - A Learning-based Approach for Distributed Multi-Radio Channel Allocation in Wireless Mesh Networks.pdf
ASCIIworm.pdf
Assessing the Uncertainty of Communication Patterns.pdf
As the net churns: Fast-flux botnet observations - Nazario - 2008.pdf
A survey of malware detection techniques - Idika - 2007.pdf
attack of the 50 foot botnet.pdf
BlackEnergy+DDoS+Bot+Analysis.pdf
blackhat_0day_patch_2008.pdf
BlackHat-DC-2010-Nve-Playing-with-SAT-1.2-wp.pdf
Building and deploying billy goat, a worm detection system - Riordan - 2006.pdf
[BW] Inside Cyber Warfare Mapping the Cyber Underworld.pdf
Choose the red pill and the blue pill - Laurie.pdf
Classification and detection of computer intrusions - Kumar - 1995.pdf
CLASSIFICATION AND DETECTION OF COMPUTER INTRUSIONS.pdf
Collaborative Detection of Fast Flux Phishing Domains - Zhou - 2009.pdf
Computer viruses as artificial life - Spafford - 1994.pdf
computer virus propagation models.pdf
Computer virus propagation models - Serazzi - 2004.pdf
conficker-summary-review-07may10-en.pdf
controlling_effection_anon_arp.pdf

Y esta lista se alarga hasta un total de 250 documentos entre papers y libros para los que anden metidos en ello les agradara.

Pero hasta ahora Snifer no das el link xD cierto aqui lo tienen en un repositorio de GitHub basta que le hagan un git clone y lo tienen.



Gracias a @soycmb por el tweet :)

1 comentario