Detecting algorithmically generated malicious domain names
暂无分享,去创建一个
Sandeep Yadav | Supranamaya Ranjan | A. L. Narasimha Reddy | Ashwath Kumar Krishna Reddy | A. Reddy | S. Ranjan | Sandeep Yadav | A. Reddy | Supranamaya Ranjan
[1] Nick Feamster,et al. Dynamics of Online Scam Hosting Infrastructure , 2009, PAM.
[2] Blaz Zupan,et al. Spam Filtering Using Statistical Data Compression Models , 2006, J. Mach. Learn. Res..
[3] John Aycock,et al. Kwyjibo: automatic domain name generation , 2008, Softw. Pract. Exp..
[4] Arvind Krishnamurthy,et al. Studying Spamming Botnets Using Botlab , 2009, NSDI.
[5] Lorenzo Martignoni,et al. FluXOR: Detecting and Monitoring Fast-Flux Service Networks , 2008, DIMVA.
[6] Minaxi Gupta,et al. Behind Phishing: An Examination of Phisher Modi Operandi , 2008, LEET.
[7] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[8] Hassen Saïdi,et al. A Foray into Conficker's Logic and Rendezvous Points , 2009, LEET.
[9] Yao Zhao,et al. BotGraph: Large Scale Spamming Botnet Detection , 2009, NSDI.
[10] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[11] Hinrich Schütze,et al. Introduction to Information Retrieval: Evaluation in information retrieval , 2008 .
[12] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[13] H. V. Trees. Detection, Estimation, And Modulation Theory , 2001 .
[14] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[15] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[16] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[17] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory: Radar-Sonar Signal Processing and Gaussian Signals in Noise , 1992 .
[18] Geoff Hulten,et al. Spamming botnets: signatures and characteristics , 2008, SIGCOMM '08.
[19] Wenke Lee,et al. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces , 2009, 2009 Annual Computer Security Applications Conference.
[20] Guofei Gu,et al. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).
[21] Steven Gianvecchio,et al. Measurement and Classification of Humans and Bots in Internet Chat , 2008, USENIX Security Symposium.
[22] M. Melamed. Detection , 2021, SETI: Astronomy as a Contact Sport.
[23] Florian Haemmerling. Unconstrained Endpoint Profiling (Googling the Internet) , 2009 .