Advertisement

Botnets and Proactive System Defense

  • John Bambenek
  • Agnes Klus
Part of the Advances in Information Security book series (ADIS, volume 36)

Keywords

Credit Card Information Security Federal Trade Commission Social Security Number Identity Theft 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Susannah Fox and Jean Beier, “ Online Banking 2006: Surfing to the Bank,” Pew Internet and American Life Project, June 14, 2006. http://www.pewinternet.org/pdfs/PIP_Online_Banking_2006.pdf.Google Scholar
  2. 2.
    John Bambenek,“Defeating Encryption,” Infosec Writers, November 11, 2004. http://www.infosecwriters.com/text\_resources/pdf/Defeating_Encryption.pdf.Google Scholar
  3. 3.
    Mary Culnan, “Bentley Survey on Consumers and Internet Security,” Securing the Weak Link in Cyberspace, November 17, 2004. http://www.bentley.edu/events/iscw2004/survey_findings.pdf.Google Scholar
  4. 4.
    4. Roger Thompson, “Cybersecurity & Consumer Data: What’s at Risk for the Consumer?,” Prepared Witness Testimony, House Committee on Energy and Commerce. November 19, 2003. http://energycommerce.house.gov/reparchives/ 108/Hearings/11192003hearing1133/Thompson1799.htm.Google Scholar
  5. 5.
    Sophos Labs,“Microsoft WMF vulnerability exploited in over 200 different attacks.” Janurary 4, 2006. http://www.sophos.com/pressoffice/news/articles/ 2006/01/wmfexploit.html.Google Scholar
  6. 6.
    John Leyden,“’Spamford’ Wallace fined $4m over spyware biz,” The Register, May 5, 2006.Google Scholar
  7. 7.
    Johannes Ullrich,“The Disappearing Patch Window,” http://isc.sans.org/ presentations/MITSecCampISCPresentation.pdf.Google Scholar
  8. 8.
    Internet Storm Center,“Handler’s Diary,” October 20, 2005, http://isc.sans.org/ diary.html?storyid=778.Google Scholar
  9. 9.
    Shadowserver Foundation,“Botnet Charts,”, May 20, 2007, http://www. shadowserver.org/wiki/pmwiki.php?n=Stats.BotnetCharts.Google Scholar
  10. 10.
    Shadowserver Foundation,“Bot Counts,”, May 20, 2007, http://www. shadowserver.org/wiki/pmwiki.php?n=Stats.BotCounts.Google Scholar
  11. 11.
    Viruslist.com,“Malware Evolution: 2005,” http://www.viruslist.com/en/ analysis?pubid=178949694.Google Scholar
  12. 12.
    Andy Patrizio, “New Means to Root Out Malware,”, Internet News, June 13, 2006, http://www.internetnews.com/security/article.php/3613236.Google Scholar
  13. 13.
    Tom Jagatic, Nathaniel Johnson, Markus Jakobsson and Filippo Menczer, “Social Phishing,” Communications of the ACM, pre-print, http://www.indiana.edu/ phishing/social-network-experiment/phishing-preprint.pdf.Google Scholar
  14. 14.
    Consumer Internet Barometer, May 20, 2007, http://www. consumerinternetbarometer.us/.Google Scholar
  15. 15.
    Federal Trade Commission, “Identity Theft Survey Report,” September, 2003, http: //www.ftc.gov/os/2003/09/synovatereport.pdf.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • John Bambenek
    • 1
  • Agnes Klus
    • 1
  1. 1.Coordinated Science Laboratory, University of Illinois at Urbana-ChampaignUrbana

Personalised recommendations