References
- Shimoura, T. (1996). Takedown. New York, Hyperion Press
- Whitcomb, D. (2006). Botmaster pleads guilty to computer crime. Reuters. LOS ANGELES
- Bejtlich, R. (2005). Extrusion Detection: Security Monitoring for Internal Intrusions, p. 83-84 Addison-Wesley Professional
- The Honeynet Project & Research Alliance (2007) Fast-Flux Service Networks. Know Your Enemy
- Robert, J. (2005). Internet Forensics, p. 1-8 O'Reilly Media, Inc
- Bejtlich, R. (2004). The Tao Of Network Security Monitoring: Beyond Intrusion Detection, p. 76-83 Addison-Wesley Professional
- Jones, K. J., R. Bejtlich, et al. (2005). Real Digital Forensics: Computer Security and Incident Response, p. 597-607 Addison-Wesley Professional
- Porras, P., H. Saidi, et al. (2007). A Multi-perspective Analysis of the Storm (Peacomm)Worm
- Ramachandran, A., N. Feamster, et al. (2006). Revealing botnet membership using DNSBL counter-intelligence. Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2. San Jose, CA, USENIX Association
- Nazario, J. (2007). 'Storm is Back, Dude!' ARBOR Security Engineering & Rerponse Tt, from http://asert.arbornetworks.com/2007/12/storm-is-back-dude/