6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Madhu Shankarapani and Srinivas Mukkamala<br />
very robust and efficiently. Experimental results show that our method is able to show how similar are<br />
these variants, which have evaded the present virus defense systems. From this method it shows how<br />
accurately we can detect Zeus/Zbot variants.<br />
References<br />
Bell, Henry and Chien, Eric. (2010) Trojan.Vundo, Symantec Technical Report [online], 17 Mar, Available:<br />
http://www.symantec.com/security_response/writeup.jsp?docid=2004-112111-3912-99 [12 Sep 2010].<br />
Chen, C. and Shi, Y. Q. (2008) “JPEG image steganalysis utilizing both intrablock and interblock correlations”,<br />
IEEE International Symposium on Circuits and Systems, Seattle, WA, 18-21 May.<br />
Cooke, E., Jahanian, F. and McPherson, D. (2006) “The zombie roundup: Understanding, detecting, and<br />
disrupting botnets”, in Usenix Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI).<br />
Freiling, F., Holz, T. and Wicherski, G. (2005) “Botnet Tracking: Exploring a Root-Cause Methodology to Prevent<br />
Distributed Denial-of-Service Attacks”, in <strong>European</strong> Symposium on Research in Computer Security<br />
(ESORICS).<br />
Fridrich, J. (2004) "Feature-based steganalysis for JPEG images and its implications for future design of<br />
steganographic schemes", in Information Hiding, <strong>6th</strong> International Workshop, LNCS 3200, pp. 67-81.<br />
Holz, T., Engelberth, M. and Freiling, F. (2008) Learning More About the Underground Economy: A Case-Study<br />
of Keyloggers and Dropzones, ReiheInformatik TR-2008-006, University of Mannheim.<br />
Kanich, C., Levchenko, K., Enright, B., Voelker, G. and Savage, S. (2008) “The Heisenbot Uncertainty Problem:<br />
Challenges in Separating Bots from Chaff”, in USENIX Workshop on Large-Scale Exploits and Emergent<br />
Threats.<br />
Karasaridis, A., Rexroad, B. and Hoeflin, D. (2007) “Wide-scale botnet detection and characterization”, in<br />
USENIX Workshop on Hot Topics in Understanding Botnet.<br />
Lyu, S. and Farid, H. (2002) "Detecting hidden messages using higher order statistics and support vector<br />
machines", in Information Hiding, 5th International Workshop, LNCS 2578, pp. 340-354.<br />
McMillan, Robert and Kirk, Jeremy. (2010) US charges 60 in connection with Zeus Trojan [online], 30 Sep,<br />
Available: http://www.csoonline.com/article/620830/us-charges-60-in-connection-with-zeus-trojan [1 Oct<br />
2010].<br />
Moscaritolo, Angela. (2009) New Verizon Wireless-themed Zeus campaign hits [online], 16 Nov,<br />
Available:http://www.scmagazineus.com/new-verizon-wireless-themed-zeus-campaign-hits/article/157848<br />
[8 Sep 2010].<br />
Nichols, Shaun. (2009) UCSB researchers hijack Torpig botnet [online], V3.co.uk, 04 May, Available:<br />
http://www.v3.co.uk/vnunet/news/2241609/researchers-hijack-botnet [06 May 2009].<br />
Offensive Computing [online], Available: http://offensivecomputing.net [21 Jul 2010].<br />
Pevny, T., and Fridrich, J. (2007) “Merging Markov and DCT features for multi-class JPEG steganalysis”, in<br />
Proceedings of SPIE Electronic Imaging, Photonics West, pp. 03-04.<br />
Qureshi, Mohammad. MBCS, MIET [online], Available: http://umer.quresh.info/Network%20Attacks.pdf [13-Dec-<br />
2010].<br />
Ragan, Steve. (2009) ZBot data dump discovered with over 74,000 FTP credentials [online], 29 Jun, Available:<br />
http://www.thetechherald.com/article.php/200927/3960/ZBot-data-dump-discovered-with-over-74-000-FTPcredentials<br />
[5 Jul 2009].<br />
Rajab, M. A., Zarfoss, J., Monrose, F. and Terzis, A. (2006) “A Multifaceted Approach to Understanding the<br />
Botnet Phenomenon”. ACM Internet Measurement <strong>Conference</strong> (IMC).<br />
Rajab, M. A., Zarfoss, J., Monrose, F. and Terzis, A. (2007) “My Botnet is Bigger than Yours (Maybe, Better than<br />
Yours): Why Size Estimates Remain Challenging”, in USENIX Workshop on Hot Topics in Understanding<br />
Botnet.<br />
Ramachandran, A., Feamster, N. and Dagon, D. (2006) “Revealing Botnet Membership Using DNSBL Counter-<br />
Intelligence”, in <strong>Conference</strong> on Steps to Reducing Unwanted Traffic on the Internet.<br />
Sallee, P. (2005) “Model based methods for steganography and steganalysis”, International Journal of Image and<br />
Graphics, Vol. 5, No. 1, 2005, 167-189.<br />
SHEVCHENKO, SERGEI. (2009) Time to Revisit Zeus Almighty [online], 16 Sep, Available:<br />
http://blog.threatexpert.com/2009_09_01_archive.html [19 Sep 2009].<br />
Shi, Y. Q., Chen, C. and Chen, W. (2006) "A Markov process based approach to effective attacking JPEG<br />
steganography", in Proceedings of the 8th international conference on Information hiding.<br />
Solanki, K., Sarkar, A. and Manjunath, B. S. (2007) "YASS: Yet another steganographic scheme that resists blind<br />
steganalysis", in Proceedings of 9th Information Hiding Workshop, ISBN:3-540-77369-X 978-3-540-77369-<br />
6, pp. 16-31, Saint Malo, France.<br />
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. and Vigna, G.<br />
(2009) “Your Botnet is My Botnet: Analysis of a Botnet Takeover”, CCS’09, 9–13 Nov, Chicago, Illinois,<br />
USA.<br />
Westfeld, A. (2001) “High capacity despite better steganalysis (F5-a steganographic algorithm)”, Information<br />
Hiding, 4th International Workshop, LNCS 2137, pp. 289-302, Springer-Verlag Berlin Heidelberg.<br />
Zeus (trojan horse). Wikipedia [online], Available: http://en.wikipedia.org/wiki/Zeus_(trojan_horse), [12 Sep 2010].<br />
Zhuang, L., Dunagan, J., Simon, D., Wang, H., Osipkov, I., Hulten, G. and Tygar, J. (2008) “Characterizing<br />
botnets from email spam records”, in USENIX Workshop on Large-Scale Exploits and Emergent Threats.<br />
259