Skip to main content

Botnets and Proactive System Defense

  • Chapter
Botnet Detection

Part of the book series: Advances in Information Security ((ADIS,volume 36))

  • 1362 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Susannah Fox and Jean Beier, “ Online Banking 2006: Surfing to the Bank,” Pew Internet and American Life Project, June 14, 2006. http://www.pewinternet.org/pdfs/PIP_Online_Banking_2006.pdf.

    Google Scholar 

  2. John Bambenek,“Defeating Encryption,” Infosec Writers, November 11, 2004. http://www.infosecwriters.com/text\_resources/pdf/Defeating_Encryption.pdf.

    Google Scholar 

  3. Mary Culnan, “Bentley Survey on Consumers and Internet Security,” Securing the Weak Link in Cyberspace, November 17, 2004. http://www.bentley.edu/events/iscw2004/survey_findings.pdf.

    Google Scholar 

  4. 4. Roger Thompson, “Cybersecurity & Consumer Data: What’s at Risk for the Consumer?,” Prepared Witness Testimony, House Committee on Energy and Commerce. November 19, 2003. http://energycommerce.house.gov/reparchives/ 108/Hearings/11192003hearing1133/Thompson1799.htm.

    Google Scholar 

  5. Sophos Labs,“Microsoft WMF vulnerability exploited in over 200 different attacks.” Janurary 4, 2006. http://www.sophos.com/pressoffice/news/articles/ 2006/01/wmfexploit.html.

    Google Scholar 

  6. John Leyden,“’Spamford’ Wallace fined $4m over spyware biz,” The Register, May 5, 2006.

    Google Scholar 

  7. Johannes Ullrich,“The Disappearing Patch Window,” http://isc.sans.org/ presentations/MITSecCampISCPresentation.pdf.

    Google Scholar 

  8. Internet Storm Center,“Handler’s Diary,” October 20, 2005, http://isc.sans.org/ diary.html?storyid=778.

    Google Scholar 

  9. Shadowserver Foundation,“Botnet Charts,”, May 20, 2007, http://www. shadowserver.org/wiki/pmwiki.php?n=Stats.BotnetCharts.

    Google Scholar 

  10. Shadowserver Foundation,“Bot Counts,”, May 20, 2007, http://www. shadowserver.org/wiki/pmwiki.php?n=Stats.BotCounts.

    Google Scholar 

  11. Viruslist.com,“Malware Evolution: 2005,” http://www.viruslist.com/en/ analysis?pubid=178949694.

    Google Scholar 

  12. Andy Patrizio, “New Means to Root Out Malware,”, Internet News, June 13, 2006, http://www.internetnews.com/security/article.php/3613236.

    Google Scholar 

  13. Tom Jagatic, Nathaniel Johnson, Markus Jakobsson and Filippo Menczer, “Social Phishing,” Communications of the ACM, pre-print, http://www.indiana.edu/ phishing/social-network-experiment/phishing-preprint.pdf.

    Google Scholar 

  14. Consumer Internet Barometer, May 20, 2007, http://www. consumerinternetbarometer.us/.

    Google Scholar 

  15. Federal Trade Commission, “Identity Theft Survey Report,” September, 2003, http: //www.ftc.gov/os/2003/09/synovatereport.pdf.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Bambenek, J., Klus, A. (2008). Botnets and Proactive System Defense. In: Lee, W., Wang, C., Dagon, D. (eds) Botnet Detection. Advances in Information Security, vol 36. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68768-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-68768-1_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-68766-7

  • Online ISBN: 978-0-387-68768-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics