• BotMiner

  • Referenced in 5 articles [sw21748]
  • show that it can detect real-world botnets (IRC-based, HTTP-based, and P2P botnets...
  • BotTokenizer

  • Referenced in 1 article [sw23890]
  • HTTP-based botnet using malicious network traces. Nowadays, malicious software and especially botnets leverage HTTP ... remains undetected. While network signature-based detection systems and models show extraordinary advantages, such ... novel network signature-based detection system that aims to detect malicious HTTP C&C traffic ... HTTP requests. Our evaluation results demonstrate that BotTokenizer performs very well on identifying HTTP-based...
  • BotSniffer

  • Referenced in 3 articles [sw21739]
  • BotSniffer: Detecting botnet command and control channels in...
  • BotProfiler

  • Referenced in 1 article [sw23891]
  • BotProfiler: profiling variability of substrings in HTTP requests...
  • PhishEye

  • Referenced in 2 articles [sw23892]
  • PhishEye: live monitoring of sandboxed phishing kits. Phishing...
  • BitShred

  • Referenced in 1 article [sw23928]
  • BitShred: feature hashing malware for scalable triage and...
  • Autograph

  • Referenced in 16 articles [sw23929]
  • Autograph: toward automated, distributed worm signature detection. Today...
  • Hamsa

  • Referenced in 5 articles [sw23930]
  • Hamsa: fast signature generation for zero-day polymorphic...
  • Polygraph

  • Referenced in 17 articles [sw23932]
  • Polygraph: automatically generating signatures for polymorphic worms. It...
  • VAMO

  • Referenced in 1 article [sw23933]
  • VAMO: towards a fully automated malware clustering validity...
  • FIRMA

  • Referenced in 2 articles [sw23934]
  • FIRMA: malware clustering and network signature generation with...
  • KEA

  • Referenced in 5 articles [sw23935]
  • KEA: practical automatic keyphrase extraction. Keyphrases provide semantic...
  • Panorama

  • Referenced in 3 articles [sw23936]
  • Panorama: capturing system-wide information flow for malware...