Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Susannah Fox and Jean Beier, “ Online Banking 2006: Surfing to the Bank,” Pew Internet and American Life Project, June 14, 2006. http://www.pewinternet.org/pdfs/PIP_Online_Banking_2006.pdf.
John Bambenek,“Defeating Encryption,” Infosec Writers, November 11, 2004. http://www.infosecwriters.com/text\_resources/pdf/Defeating_Encryption.pdf.
Mary Culnan, “Bentley Survey on Consumers and Internet Security,” Securing the Weak Link in Cyberspace, November 17, 2004. http://www.bentley.edu/events/iscw2004/survey_findings.pdf.
4. Roger Thompson, “Cybersecurity & Consumer Data: What’s at Risk for the Consumer?,” Prepared Witness Testimony, House Committee on Energy and Commerce. November 19, 2003. http://energycommerce.house.gov/reparchives/ 108/Hearings/11192003hearing1133/Thompson1799.htm.
Sophos Labs,“Microsoft WMF vulnerability exploited in over 200 different attacks.” Janurary 4, 2006. http://www.sophos.com/pressoffice/news/articles/ 2006/01/wmfexploit.html.
John Leyden,“’Spamford’ Wallace fined $4m over spyware biz,” The Register, May 5, 2006.
Johannes Ullrich,“The Disappearing Patch Window,” http://isc.sans.org/ presentations/MITSecCampISCPresentation.pdf.
Internet Storm Center,“Handler’s Diary,” October 20, 2005, http://isc.sans.org/ diary.html?storyid=778.
Shadowserver Foundation,“Botnet Charts,”, May 20, 2007, http://www. shadowserver.org/wiki/pmwiki.php?n=Stats.BotnetCharts.
Shadowserver Foundation,“Bot Counts,”, May 20, 2007, http://www. shadowserver.org/wiki/pmwiki.php?n=Stats.BotCounts.
Viruslist.com,“Malware Evolution: 2005,” http://www.viruslist.com/en/ analysis?pubid=178949694.
Andy Patrizio, “New Means to Root Out Malware,”, Internet News, June 13, 2006, http://www.internetnews.com/security/article.php/3613236.
Tom Jagatic, Nathaniel Johnson, Markus Jakobsson and Filippo Menczer, “Social Phishing,” Communications of the ACM, pre-print, http://www.indiana.edu/ phishing/social-network-experiment/phishing-preprint.pdf.
Consumer Internet Barometer, May 20, 2007, http://www. consumerinternetbarometer.us/.
Federal Trade Commission, “Identity Theft Survey Report,” September, 2003, http: //www.ftc.gov/os/2003/09/synovatereport.pdf.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Bambenek, J., Klus, A. (2008). Botnets and Proactive System Defense. In: Lee, W., Wang, C., Dagon, D. (eds) Botnet Detection. Advances in Information Security, vol 36. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68768-1_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-68768-1_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-68766-7
Online ISBN: 978-0-387-68768-1
eBook Packages: Computer ScienceComputer Science (R0)