services of a botnet, the forums in which this informa-
tion is published, the way that clients access to these
forums, etc.
ACKNOWLEDGEMENTS
This work has been partially supported by Spanish
MCIN under project TEC2008-06663-C03-02.
REFERENCES
Barford, P. and Yegneswaran, V. (2007). An inside look
at botnets. In Malware Detection, volume 27 of Ad-
vances in Information Security, chapter 8, pages 171–
191. Springer US, Boston, MA.
Chen, C.-M., Ou, Y.-H., and Tsai, Y.-C. (2010). Web bot-
net detection based on flow information. In Computer
Symposium (ICS), 2010 International, pages 381–384.
Chien, E. (2010). W32.stuxnet dossier. Technical report,
Symantec.
Cormack, G. V. (2008). Email spam filtering: A systematic
review. Found. Trends Inf. Retr., 1:335–455.
Dagon, D., Gu, G., Lee, C., and Lee, W. (2007). A taxon-
omy of botnet structures. In Computer Security Ap-
plications Conference, 2007. ACSAC 2007. Twenty-
Third Annual, pages 325–339.
Daswani, N. and Stoppelman, M. (2007). The anatomy of
clickbot.a. In Proceedings of the first conference on
First Workshop on Hot Topics in Understanding Bot-
nets, Berkeley, CA, USA. USENIX Association.
Faghani, M. and Saidi, H. (2009). Malware propagation in
online social networks. In Malicious and Unwanted
Software (MALWARE), 2009 4th International Con-
ference on, pages 8–14.
FBI (2007). Over one million potential victims of botnet
cyber crime. Technical report, FBI Press Release.
FBI (2010). Another pleads guilty in botnet hacking con-
spiracy. Technical report, FBI Press Release.
Feily, M., Shahrestani, A., and Ramadass, S. (2009). A Sur-
vey of Botnet and Botnet Detection. SECURWARE.
Goebel, J. and Holz, T. (2007). Rishi: identify bot contam-
inated hosts by irc nickname evaluation. In Proceed-
ings of the first conference on First Workshop on Hot
Topics in Understanding Botnets, Berkeley, CA, USA.
USENIX Association.
Grizzard, J. B., Sharma, V., Nunnery, C., Kang, B. B., and
Dagon, D. (2007). Peer-to-peer botnets: overview and
case study. Proceedings of the first conference on Hot
Topics in Understanding Botnets.
Gu, G., Zhang, J., and Lee, W. (2008). BotSniffer: Detect-
ing Botnet Command and Control Channels in Net-
work Traffic. In Proceedings of the Network and Dis-
tributed System Security Symposium (NDSS).
Kang, J. and Song, Y.-Z. (2010). Detecting new decen-
tralized botnet based on kalman filter and multi-chart
cusum amplification. In NSWCTC 2010, volume 1,
pages 7–10.
Levy, E. (2004). Interface illusions. Security Privacy, IEEE,
2(6):66–69.
Liu, J., Xiao, Y., Ghaboosi, K., Deng, H., and Zhang, J.
(2009). Botnet: classification, attacks, detection, trac-
ing, and preventive measures. EURASIP Journal on
Wireless Communications and Networking.
Mirkovic, J. and Reiher, P. (2004). A taxonomy of ddos at-
tack and ddos defense mechanisms. SIGCOMM Com-
put. Commun. Rev., 34(2):39–53.
Namestnikov, Y. (2009). The economics of botnets. Tech-
nical report, Securelist.
NVD (2010). Vulnerabilities in the last three years. Tech-
nical report, National Vulnerability Database.
Porras, P., Sadi, H., Yegneswaran, V., Porras, P., Sadi, H.,
and Yegneswaran, V. (2007). A multi-perspective
analysis of the storm (peacomm) worm. Technical re-
port, Cyber-TA Project Page.
Project, T. H. (2004). Know your Enemy: Learning about
Security Threats. Addison Wesley Publishing, 2nd
edition edition.
Stewart, J. (2004a). Bobax trojan analysis. Technical report,
SecureWorks.
Stewart, J. (2004b). Bobax trojan analysis. Technical report,
SecureWorks.
Stewart, J. (2004c). Phatbot trojan analysis. Technical re-
port, SecureWorks.
Stewart, J. (2006). Spamthru trojan analysis. Technical
report, SecureWorks.
Stewart, J. (2010). Zeus banking trojan report. Technical
report, SecureWorks.
Weber, T. (2007). Criminals ’may overwhelm the web’.
Technical report, BBC News.
Wilbur, K. C. and Zhu, Y. (2009). Click fraud. Marketing
Science, 28:293–308.
Wilson, C. (2007). Botnets, cybercrime, and cyberterror-
ism: Vulnerabilities and policy issues for congress.
Technical report, CRS Report for Congress.
SECRYPT 2011 - International Conference on Security and Cryptography
262