**Chapter 4**

*Computer Security Threats*

ins.2014.03.066

2014;**278**:488-497. DOI: 10.1016/j.

Sweden. 2018. DOI: 10.23919/ IFIPNetworking.2017.8264866

et al. Spamalytics: An empirical analysis of spam marketing conversion. Communications of the ACM. 2009;**52**(9):99-107. DOI:

[19] Thomas K, Nicol DM. The

Koobface Botnet and the rise of social malware. In: International Conference on Malicious & Unwanted Software. Nancy, Lorraine, France. 2011. DOI: 10.1109/MALWARE.2010.5665793

[20] Rossow C, Andriesse D, Werner T, et al. SoK: P2PWNED - Modeling and evaluating the resilience of peer-topeer Botnets. In: IEEE Symposium on Security & Privacy. Berkeley, CA, USA. 2013. pp. 97-111. DOI: 10.1109/

[21] Stringhini G, Hohlfeld O, Kruegel C, et al. The harvester, the botmaster, and the spammer: On the relations between the different actors in the spam landscape. In: Acm Symposium on Information. ACM; 2014. DOI:

10.1145/2590296.2590302

[22] Li Z, Goyal A, Yan C. Honeynetbased Botnet scan traffic analysis. Botnet Detection. 2008. DOI: 10.1007/978-0-387-68768-1\_2

[23] Peng T, Harris I, Sawa Y. Detecting phishing attacks using natural language processing and machine learning. In: 2018 IEEE 12th International Conference on Semantic Computing (ICSC). IEEE; Laguna Hills, CA, USA. 2018. DOI: 10.1109/ICSC.2018.00056

10.1145/1562164.1562190

sp.2013.17

[17] Abaid Z, Kaafar MA, Jha S. Early detection of in-the-wild Botnet attacks by exploiting network communication uniformity: An empirical study. In: Ifip Networking Conference. Stockholm,

[24] Yadav S, Reddy AKK, Reddy ALN, et al. Detecting algorithmically generated domain-flux attacks with DNS traffic analysis. IEEE/ ACM Transactions on Networking. 2012;**20**(5):1663-1677. DOI: 10.1109/

TNET.2012.2184552

[25] Cook DL, Gurbani VK,

Daniluk M. Phishwish: A simple and stateless phishing filter. Security & Communication Networks. 2010;**2**(1):29-43. DOI: 10.1002/sec.45

[26] Khattak S, Ramay NR, Khan KR, et al. A taxonomy of Botnet behavior,

Communication Surveys and Tutorials. 2014;**16**(2):898-924. DOI: 10.1109/

[27] Tanner BK, Warner G, Stern H. Koobface: The Evolution of the Social Botnet. Ecrime Researchers Summit.

detection, and Defense. IEEE

SURV.2013.091213.00134

2010. pp. 1-10. DOI: 10.1109/

ecrime.2010.5706694

[18] Kanich C, Kreibich C, Levchenko K,

**38**
