Stein, L. A. (2004). OWL Web Ontology Language
Overview. http://www.w3.org/TR/owl-features.
Berners-Lee, T. and Connolly, D. (2014). Notation3
(N3): A readable RDF syntax. http://www.w3.org/
TeamSubmission/n3/.
botherder (2012). Skynet, a Tor-
powered botnet straight from Reddit.
http://www.reddit.com/r/netsec/comments/14etfq/
skynet a torpowered botnet straight from reddit/.
Constantin, L. (2012). Tor network
used to command Skynet botnet.
http://www.pcworld.idg.com.au/article/444088/
tor network used command skynet botnet/.
Diaz, Jr, E. and Estavillol, P. (2010). Win32/Vobfus.
http://www.microsoft.com/security/portal/threat/
encyclopedia/Entry.aspx?Name=Win32%2fVobfus.
Feily, M., Shahrestani, A., and Ramadass, S. (2009). A sur-
vey of botnet and botnet detection. In Emerging Se-
curity Information, Systems and Technologies, 2009.
SECURWARE’09. Third International Conference on,
pages 268–273. IEEE.
Gu, G., Yegneswaran, V., Porras, P., Stoll, J., and Lee,
W. (2009). Active botnet probing to identify obscure
command and control channels. In Computer Secu-
rity Applications Conference, 2009. ACSAC’09. An-
nual, pages 241–253. IEEE.
Guarnieri, C. (2012). Skynet, a Tor-powered botnet
straight from Reddit. http://community.rapid7.com/
community/infosec/blog/2012/12/06/skynet-a-tor-
powered-botnet-straight-from-reddit.
Kumar, M. (2013). Alleged Skynet Botnet creator arrested
in Germany. http://thehackernews.com/2013/12/
alleged-skynet-botnet-creator-arrested.html/.
Mancuso, V. F., Minotra, D., Giacobe, N., McNeese, M.,
and Tyworth, M. (2012). idsnets: An experimen-
tal platform to study situation awareness for intru-
sion detection analysts. In Cognitive Methods in Sit-
uation Awareness and Decision Support (CogSIMA),
2012 IEEE International Multi-Disciplinary Confer-
ence on, pages 73–79. IEEE.
Manola, F., Miller, E., and McBride, B. (2014). Rdf 1.1
Primer. http://www.w3.org/TR/rdf11-primer/.
Mathews, M. L., Halvorsen, P., Joshi, A., and Finin, T.
(2012). A collaborative approach to situational aware-
ness for cybersecurity. In Collaborative Computing:
Networking, Applications and Worksharing (Collab-
orateCom), 2012 8th International Conference on,
pages 216–222. IEEE.
McRee, R. (2006). http://holisticinfosec.org/toolsmith/
files/nov2k6/toolsmith.pcap.
Mila (2012). Dec. 2012 Skynet Tor botnet / Trojan.Tbot
samples. http://contagiodump.blogspot.com/2012/
12/dec-2012-skynet-tor-botnet-trojantbot.html.
Mila (2013). Trojan Nap aka Kelihos/Hlux status update by
DeepEnd Research and samples. http://ontagiodump.
blogspot.com/2013/02/trojan-nap-aka-kelihoshlux-
status.html.
More, S., Matthews, M., Joshi, A., and Finin, T. (2012).
A knowledge-based approach to intrusion detection
modeling. In Security and Privacy Workshops (SPW),
2012 IEEE Symposium on, pages 75–81. IEEE.
Prince, B. (2015). Obama administration proposes giving
courts more power to issue botnet injunctions. http://
www.securityweek.com/obama-administration-
proposes-giving-courts-more-power-issue-botnet-
injunctions.
RapidMiner (2015). http://rapidminer.com/.
Sharma, P., Joshi, A., and Finin, T. (2013). Detecting
data exfiltration by integrating information across lay-
ers. In Information Reuse and Integration (IRI), 2013
IEEE 14th International Conference on, pages 309–
316. IEEE.
Shin, S., Lin, R., and Gu, G. (2011). Cross-analysis of bot-
net victims: New insights and implications. In Re-
cent Advances in Intrusion Detection, pages 242–261.
Springer.
Spasojevi, B. (2012). Trojan. Tbot. http://
www.symantec.com/security response/writeup.jsp?
docid=2012-120716-2955-99.
Squicciarini, A. C., Petracca, G., Horne, W. G., and Nath,
A. (2014). Situational awareness through reasoning
on network incidents. In Proceedings of the 4th ACM
conference on Data and application security and pri-
vacy, pages 111–122. ACM.
Thuraisingham, B., Hamlen, K. W., Khan, L., and Masud,
M. M. (2008). Data mining for security applications.
In Embedded and Ubiquitous Computing, IEEE/IFIP
International Conference on, volume 2, pages 585–
589. IEEE.
Undercoffer, J., Joshi, A., and Pinkston, J. (2003). Mod-
eling computer attacks: An ontology for intrusion de-
tection. In Recent Advances in Intrusion Detection,
pages 113–135. Springer.
VirusTotal (2015). https://www.virustotal.com/en//.
Wireshark (2015). http://www.wireshark.org/.
Young, E., Honda, H., and Bell, H. (2009). W32.Changeup.
http://www.symantec.com/security response/
writeup.jsp?docid=2009-081806-2906-99.
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
298