27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Madhu Shankarapani and Srinivas Mukkamala<br />

very robust and efficiently. Experimental results show that our method is able to show how similar are<br />

these variants, which have evaded the present virus defense systems. From this method it shows how<br />

accurately we can detect Zeus/Zbot variants.<br />

References<br />

Bell, Henry and Chien, Eric. (2010) Trojan.Vundo, Symantec Technical Report [online], 17 Mar, Available:<br />

http://www.symantec.com/security_response/writeup.jsp?docid=2004-112111-3912-99 [12 Sep 2010].<br />

Chen, C. and Shi, Y. Q. (2008) “JPEG image steganalysis utilizing both intrablock and interblock correlations”,<br />

IEEE International Symposium on Circuits and Systems, Seattle, WA, 18-21 May.<br />

Cooke, E., Jahanian, F. and McPherson, D. (2006) “The zombie roundup: Understanding, detecting, and<br />

disrupting botnets”, in Usenix Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI).<br />

Freiling, F., Holz, T. and Wicherski, G. (2005) “Botnet Tracking: Exploring a Root-Cause Methodology to Prevent<br />

Distributed Denial-of-Service Attacks”, in <strong>European</strong> Symposium on Research in Computer Security<br />

(ESORICS).<br />

Fridrich, J. (2004) "Feature-based steganalysis for JPEG images and its implications for future design of<br />

steganographic schemes", in Information Hiding, <strong>6th</strong> International Workshop, LNCS 3200, pp. 67-81.<br />

Holz, T., Engelberth, M. and Freiling, F. (2008) Learning More About the Underground Economy: A Case-Study<br />

of Keyloggers and Dropzones, ReiheInformatik TR-2008-006, University of Mannheim.<br />

Kanich, C., Levchenko, K., Enright, B., Voelker, G. and Savage, S. (2008) “The Heisenbot Uncertainty Problem:<br />

Challenges in Separating Bots from Chaff”, in USENIX Workshop on Large-Scale Exploits and Emergent<br />

Threats.<br />

Karasaridis, A., Rexroad, B. and Hoeflin, D. (2007) “Wide-scale botnet detection and characterization”, in<br />

USENIX Workshop on Hot Topics in Understanding Botnet.<br />

Lyu, S. and Farid, H. (2002) "Detecting hidden messages using higher order statistics and support vector<br />

machines", in Information Hiding, 5th International Workshop, LNCS 2578, pp. 340-354.<br />

McMillan, Robert and Kirk, Jeremy. (2010) US charges 60 in connection with Zeus Trojan [online], 30 Sep,<br />

Available: http://www.csoonline.com/article/620830/us-charges-60-in-connection-with-zeus-trojan [1 Oct<br />

2010].<br />

Moscaritolo, Angela. (2009) New Verizon Wireless-themed Zeus campaign hits [online], 16 Nov,<br />

Available:http://www.scmagazineus.com/new-verizon-wireless-themed-zeus-campaign-hits/article/157848<br />

[8 Sep 2010].<br />

Nichols, Shaun. (2009) UCSB researchers hijack Torpig botnet [online], V3.co.uk, 04 May, Available:<br />

http://www.v3.co.uk/vnunet/news/2241609/researchers-hijack-botnet [06 May 2009].<br />

Offensive Computing [online], Available: http://offensivecomputing.net [21 Jul 2010].<br />

Pevny, T., and Fridrich, J. (2007) “Merging Markov and DCT features for multi-class JPEG steganalysis”, in<br />

Proceedings of SPIE Electronic Imaging, Photonics West, pp. 03-04.<br />

Qureshi, Mohammad. MBCS, MIET [online], Available: http://umer.quresh.info/Network%20Attacks.pdf [13-Dec-<br />

2010].<br />

Ragan, Steve. (2009) ZBot data dump discovered with over 74,000 FTP credentials [online], 29 Jun, Available:<br />

http://www.thetechherald.com/article.php/200927/3960/ZBot-data-dump-discovered-with-over-74-000-FTPcredentials<br />

[5 Jul 2009].<br />

Rajab, M. A., Zarfoss, J., Monrose, F. and Terzis, A. (2006) “A Multifaceted Approach to Understanding the<br />

Botnet Phenomenon”. ACM Internet Measurement <strong>Conference</strong> (IMC).<br />

Rajab, M. A., Zarfoss, J., Monrose, F. and Terzis, A. (2007) “My Botnet is Bigger than Yours (Maybe, Better than<br />

Yours): Why Size Estimates Remain Challenging”, in USENIX Workshop on Hot Topics in Understanding<br />

Botnet.<br />

Ramachandran, A., Feamster, N. and Dagon, D. (2006) “Revealing Botnet Membership Using DNSBL Counter-<br />

Intelligence”, in <strong>Conference</strong> on Steps to Reducing Unwanted Traffic on the Internet.<br />

Sallee, P. (2005) “Model based methods for steganography and steganalysis”, International Journal of Image and<br />

Graphics, Vol. 5, No. 1, 2005, 167-189.<br />

SHEVCHENKO, SERGEI. (2009) Time to Revisit Zeus Almighty [online], 16 Sep, Available:<br />

http://blog.threatexpert.com/2009_09_01_archive.html [19 Sep 2009].<br />

Shi, Y. Q., Chen, C. and Chen, W. (2006) "A Markov process based approach to effective attacking JPEG<br />

steganography", in Proceedings of the 8th international conference on Information hiding.<br />

Solanki, K., Sarkar, A. and Manjunath, B. S. (2007) "YASS: Yet another steganographic scheme that resists blind<br />

steganalysis", in Proceedings of 9th Information Hiding Workshop, ISBN:3-540-77369-X 978-3-540-77369-<br />

6, pp. 16-31, Saint Malo, France.<br />

Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. and Vigna, G.<br />

(2009) “Your Botnet is My Botnet: Analysis of a Botnet Takeover”, CCS’09, 9–13 Nov, Chicago, Illinois,<br />

USA.<br />

Westfeld, A. (2001) “High capacity despite better steganalysis (F5-a steganographic algorithm)”, Information<br />

Hiding, 4th International Workshop, LNCS 2137, pp. 289-302, Springer-Verlag Berlin Heidelberg.<br />

Zeus (trojan horse). Wikipedia [online], Available: http://en.wikipedia.org/wiki/Zeus_(trojan_horse), [12 Sep 2010].<br />

Zhuang, L., Dunagan, J., Simon, D., Wang, H., Osipkov, I., Hulten, G. and Tygar, J. (2008) “Characterizing<br />

botnets from email spam records”, in USENIX Workshop on Large-Scale Exploits and Emergent Threats.<br />

259

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!