Results 1 - 10
of
8,802
Table 1: Botnet scan commands captured on a live /15 academic network during May 2005. The table shows that 70% of the captured commands were targeted at a specific /8 or /16 network.
2006
"... In PAGE 3: ... We looked for the specific command signatures of Agobot/Phatbot [7], rBot/SDBot [19], and Ghost-Bot in the payloads of traf- fic captured in a large academic network. Table1 shows a list of commands from approximately 11 bots detected by the system during May 2005. Each command in- structs the bot to begin scanning a range of IP addresses.... ..."
Cited by 6
Table 2: Comparison of total / average number of collected malware samples for number of captures, binaries, variants, and families between Nepenthes and HoneyBow
"... In PAGE 10: ...7% of the samples in the last scan one whole month after the samples was collected. Table2 summarizes the comparison of collected malware samples for both Ne- penthes and HoneyBow. On average, Nepenthes collects 1,539 samples per day and HoneyBow 1,359, thus Nepenthes captures slightly more samples per day.... In PAGE 11: ...abel Trojan.Delf-1470 and binary B the label Trojan.Delf-142, both belong to the same family, but are di erent variants. As shown in Table2 , during the measurement period, Nepenthes collected 467 di erent malware variations of 64 families, but HoneyBow... ..."
Table 1. Encoding primitive operations for binary counters
2004
"... In PAGE 3: ...valuates to true (resp. false) under stable model semantics. In order to capture level numberings with binary counters, we need certain primitive operations to be used as subpro- grams of the forthcoming translation TrAT(P). The first set of subprograms, as listed in upper half of Table1 , concen- trates on setting counters to particular values. Each subpro- gram is to be activated only when an additional controlling atom c cannot be inferred by other rules.... ..."
Cited by 4
Table 1. Individual Bots vs. CF of Users
1999
Cited by 137
Table 3. Summary of bot command detection.
2007
"... In PAGE 10: ... Bots in general exhibit a great volume and diversity of behaviors. Table3 provides a summary of our test results. Row 1 identifies the total number of commands provided by each of the tested bots.... ..."
Cited by 2
Table 4: ShopBot CBMG.
2001
"... In PAGE 7: ...05 14 search 99.83 30391 Table 5: ShopBots Function Distribution and Number of Visits Table4 shows the averaged CBMG for the ShopBots. It shows a simple structure: the rst state is almost always \search apos;, and the robot leaves the \search quot; state with a very low probability.... ..."
Cited by 3
Table 6: Description of channel service bot commands.
"... In PAGE 8: ...3 Market Services and Treachery The channel service bot is an interactive script run by channel administrators for the purpose of providing useful services such as credit card limit checks and access to a BIN list. Table6 describes commonly issued commands. Command Distribution: Measurement Methodology.... ..."
Table 5: ShopBots Function Distribution and
2001
"... In PAGE 7: ... It shows a simple structure: the rst state is almost always \search apos;, and the robot leaves the \search quot; state with a very low probability. This is con rmed by Table5 , which shows the distribution of visits to each state per session, derived from the CBMG. The behavior indicates that the ShopBots perform (almost) exclusively searches, and that usually they have long sessions.... ..."
Cited by 3
Table 2: Program code for WebBot.
2006
Results 1 - 10
of
8,802