@article{bib:persistentstruct, author = {James R Driscoll and Neil Sarnak and Daniel D. Sleator and Robert E. Tarjan}, title = {Making Data Structures Persistent}, journal = {Journal of Computer and System Sciences}, year = {1989}, month = {02}, volume = {Vol. 38, No. 1}, pages = {86-124} } @article{zhang_building_2014, title = {Building a Scalable System for Stealthy P2P-Botnet Detection}, volume = {9}, issn = {1556-6013, 1556-6021}, url = {http://ieeexplore.ieee.org/document/6661360/}, doi = {10.1109/TIFS.2013.2290197}, pages = {27--38}, number = {1}, journaltitle = {{IEEE} Transactions on Information Forensics and Security}, shortjournal = {{IEEE} Trans.Inform.Forensic Secur.}, author = {Zhang, Junjie and Perdisci, Roberto and Lee, Wenke and Luo, Xiapu and Sarfraz, Unum}, urldate = {2021-11-09}, date = {2014-01}, file = {Full Text:/home/me/Zotero/storage/PFXP8NLV/Zhang et al. - 2014 - Building a Scalable System for Stealthy P2P-Botnet.pdf:application/pdf} } @incollection{kim_survey_2012, location = {Dordrecht}, title = {A Survey on P2P Botnet Detection}, volume = {120}, isbn = {978-94-007-2910-0 978-94-007-2911-7}, url = {http://link.springer.com/10.1007/978-94-007-2911-7_56}, pages = {589--593}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security 2011}, publisher = {Springer Netherlands}, author = {Han, Kyoung-Soo and Im, Eul Gyu}, editor = {Kim, Kuinam J. and Ahn, Seong Jin}, urldate = {2021-11-11}, date = {2012}, doi = {10.1007/978-94-007-2911-7_56}, note = {Series Title: Lecture Notes in Electrical Engineering}, file = {Full Text:/home/me/Zotero/storage/CMFWF58V/Han and Im - 2012 - A Survey on P2P Botnet Detection.pdf:application/pdf} } @online{statista_iot_2020, title = {Number of Internet of Things (IoT) Connected Devices Worldwide from 2019 to 2030}, organization = {Statista Inc.}, publisher = {Transforma Insights}, date = {2020-12}, url = {https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/}, urldate = {2021-11-11}, archiveurl = {https://web.archive.org/web/20211025185804/https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/}, archivedate = {2021-10-25} } @online{statista_broadband_2021, title = {Availability of broadband internet to households in Germany from 2017 to 2020, by bandwidth class}, organization = {Statista Inc.}, publisher = {BMVI}, date = {2021-08-16}, url = {https://www.statista.com/statistics/460180/broadband-availability-by-bandwidth-class-germany/}, urldate = {2021-11-11}, archiveurl = {https://web.archive.org/web/20210309010747/https://www.statista.com/statistics/460180/broadband-availability-by-bandwidth-class-germany/}, archivedate = {2021-03-09} } @online{ars_ddos_2016, title = {Brace yourselves --- source code powering potent IoT DDoSes just went public}, date = {2016-10-02}, author = {Dan Goodin}, organization = {Ars Technica}, url = {https://arstechnica.com/information-technology/2016/10/brace-yourselves-source-code-powering-potent-iot-ddoses-just-went-public/}, urldate = {2021-11-11}, archiveurl = {https://web.archive.org/web/20211022032617/https://arstechnica.com/information-technology/2016/10/brace-yourselves-source-code-powering-potent-iot-ddoses-just-went-public/}, archivedate = {2021-10-22}, } @article{fan_p2p_2014, title = {A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection}, volume = {8}, issn = {17389976, 17389976}, url = {http://article.nadiapub.com/IJSIA/vol8_no3/10.pdf}, doi = {10.14257/ijsia.2014.8.3.10}, pages = {87--96}, number = {3}, journaltitle = {International Journal of Security and Its Applications}, shortjournal = {{IJSIA}}, author = {Fan, Yuhui and Xu, Ning}, urldate = {2021-11-11}, date = {2014-05-31}, file = {Full Text:/home/me/Zotero/storage/7UI2IFIL/Fan and Xu - 2014 - A P2P Botnet Detection Method Used On-line Monitor.pdf:application/pdf} } @inproceedings{bock_poster_2019, location = {London United Kingdom}, title = {Poster: Challenges of Accurately Measuring Churn in P2P Botnets}, isbn = {978-1-4503-6747-9}, url = {https://dl.acm.org/doi/10.1145/3319535.3363281}, doi = {10.1145/3319535.3363281}, shorttitle = {Poster}, eventtitle = {{CCS} '19: 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security}, pages = {2661--2663}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security}, publisher = {{ACM}}, author = {Böck, Leon and Karuppayah, Shankar and Fong, Kory and Mühlhäuser, Max and Vasilomanolakis, Emmanouil}, urldate = {2021-11-12}, date = {2019-11-06}, langid = {english}, file = {Böck et al. - 2019 - Poster Challenges of Accurately Measuring Churn i.pdf:/home/me/Zotero/storage/FGQXMN3H/Böck et al. - 2019 - Poster Challenges of Accurately Measuring Churn i.pdf:application/pdf} } @inproceedings{karuppayah_boobytrap_2016, location = {Kuala Lumpur, Malaysia}, title = {{BoobyTrap}: On autonomously detecting and characterizing crawlers in P2P botnets}, isbn = {978-1-4799-6664-6}, url = {http://ieeexplore.ieee.org/document/7510885/}, doi = {10.1109/ICC.2016.7510885}, shorttitle = {{BoobyTrap}}, eventtitle = {{ICC} 2016 - 2016 {IEEE} International Conference on Communications}, pages = {1--7}, booktitle = {2016 {IEEE} International Conference on Communications ({ICC})}, publisher = {{IEEE}}, author = {Karuppayah, Shankar and Vasilomanolakis, Emmanouil and Haas, Steffen and Muhlhauser, Max and Fischer, Mathias}, urldate = {2021-11-12}, date = {2016-05}, file = {Karuppayah et al. - 2016 - BoobyTrap On autonomously detecting and character.pdf:/home/me/Zotero/storage/UAUH5ZAN/Karuppayah et al. - 2016 - BoobyTrap On autonomously detecting and character.pdf:application/pdf} } @inproceedings{andriesse_reliable_2015, location = {Tokyo Japan}, title = {Reliable Recon in Adversarial Peer-to-Peer Botnets}, isbn = {978-1-4503-3848-6}, url = {https://dl.acm.org/doi/10.1145/2815675.2815682}, doi = {10.1145/2815675.2815682}, eventtitle = {{IMC} '15: Internet Measurement Conference}, pages = {129--140}, booktitle = {Proceedings of the 2015 Internet Measurement Conference}, publisher = {{ACM}}, author = {Andriesse, Dennis and Rossow, Christian and Bos, Herbert}, urldate = {2021-11-16}, date = {2015-10-28}, langid = {english}, file = {Andriesse et al. - 2015 - Reliable Recon in Adversarial Peer-to-Peer Botnets.pdf:/home/me/Zotero/storage/YJZMYTCB/Andriesse et al. - 2015 - Reliable Recon in Adversarial Peer-to-Peer Botnets.pdf:application/pdf} } @inproceedings{karuppayah_sensorbuster_2017, title = {{{SensorBuster}}: {{On Identifying Sensor Nodes}} in {{P2P Botnets}}}, shorttitle = {{{SensorBuster}}}, booktitle = {Proceedings of the 12th {{International Conference}} on {{Availability}}, {{Reliability}} and {{Security}}}, author = {Karuppayah, Shankar and Böck, Leon and Grube, Tim and Manickam, Selvakumar and Mühlhäuser, Max and Fischer, Mathias}, date = {2017-08-29}, pages = {1--6}, publisher = {{Association for Computing Machinery}}, location = {{New York, NY, USA}}, doi = {10.1145/3098954.3098991}, url = {https://doi.org/10.1145/3098954.3098991}, urldate = {2021-03-23}, abstract = {The ever-growing number of cyber attacks originating from botnets has made them one of the biggest threat to the Internet ecosystem. Especially P2P-based botnets like ZeroAccess and Sality require special attention as they have been proven to be very resilient against takedown attempts. To identify weaknesses and to prepare takedowns more carefully it is thus a necessity to monitor them by crawling and deploying sensor nodes. This in turn provokes botmasters to come up with monitoring countermeasures to protect their assets. Most existing anti-monitoring countermeasures focus mainly on the detection of crawlers and not on the detection of sensors deployed in a botnet. In this paper, we propose two sensor detection mechanisms called SensorRanker and SensorBuster. We evaluate these mechanisms in two real world botnets, Sality and ZeroAccess. Our results indicate that SensorRanker and SensorBuster are able to detect up to 17 sensors deployed in Sality and four within ZeroAccess.}, file = {/home/me/Zotero/storage/ZDUFTXYY/Karuppayah et al. - 2017 - SensorBuster On Identifying Sensor Nodes in P2P B.pdf}, isbn = {978-1-4503-5257-4}, keywords = {Anti-monitoring,Countermeasure,Detection,P2P Botnet,Sensor}, series = {{{ARES}} '17} } @report{page_pagerank_1998, title = {{The PageRank Citation Ranking: Bringing Order to the Web}}, shorttitle = {{The PageRank Citation Ranking}}, author = {Page, Lawrence and Brin, Sergey and Motwani, Rajeev and Winograd, Terry}, date = {1998-01-29}, url = {http://ilpubs.stanford.edu:8090/422/1/1999-66.pdf}, urldate = {2021-11-30}, abstract = {The importance of a Web page is an inherently subjective matter, which depends on the readers interests, knowledge and attitudes. But there is still much that can be said objectively about the relative importance of Web pages. This paper describ es PageRank, a method for rating Web pages objectively and mechanically, effectively measuring the human interest and attention devoted to them. We compare PageRank to an idealized random Web surfer. We show how to efficiently compute PageRank for large numbers of pages. And, we show how to apply PageRank to search and to user navigation.} } @inproceedings{andriesse_goz_2013, title = {Highly Resilient Peer-to-Peer Botnets Are Here: {{An}} Analysis of {{Gameover Zeus}}}, shorttitle = {Highly Resilient Peer-to-Peer Botnets Are Here}, booktitle = {2013 8th {{International Conference}} on {{Malicious}} and {{Unwanted Software}}: "{{The Americas}}" ({{MALWARE}})}, author = {Andriesse, Dennis and Rossow, Christian and Stone-Gross, Brett and Plohmann, Daniel and Bos, Herbert}, date = {2013-10}, pages = {116--123}, publisher = {{IEEE}}, location = {{Fajardo, PR, USA}}, doi = {10.1109/MALWARE.2013.6703693}, url = {https://ieeexplore.ieee.org/document/6703693/}, urldate = {2022-02-27}, eventtitle = {2013 8th {{International Conference}} on {{Malicious}} and {{Unwanted Software}}: "{{The Americas}}" ({{MALWARE}})}, isbn = {978-1-4799-2534-6 978-1-4799-2535-3}, file = {/home/me/Zotero/storage/R3AAQR9Q/Andriesse et al. - 2013 - Highly resilient peer-to-peer botnets are here An.pdf} } @inproceedings{stutzbach_churn_2006, title = {Understanding Churn in Peer-to-Peer Networks}, booktitle = {Proceedings of the 6th {{ACM SIGCOMM}} on {{Internet}} Measurement - {{IMC}} '06}, author = {Stutzbach, Daniel and Rejaie, Reza}, date = {2006}, pages = {189}, publisher = {{ACM Press}}, location = {{Rio de Janeriro, Brazil}}, doi = {10.1145/1177080.1177105}, url = {http://portal.acm.org/citation.cfm?doid=1177080.1177105}, urldate = {2022-03-08}, eventtitle = {The 6th {{ACM SIGCOMM}}}, isbn = {978-1-59593-561-8}, langid = {english} } /* vim: set filetype=bib ts=2 sw=2 tw=0 et :*/