Survey on botnet: Its architecture, detection, prevention and mitigation
暂无分享,去创建一个
[1] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[2] Wang Hailong,et al. Heterogeneous Multi-sensor Information Fusion Model for Botnet Detection , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.
[3] Yong Tang,et al. Defending against Internet worms: a signature-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[4] Sven Dietrich,et al. P2P as botnet command and control: A deeper insight , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[5] John McHugh,et al. Sybil attacks as a mitigation strategy against the Storm botnet , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[6] Radu State,et al. BotCloud: Detecting botnets using MapReduce , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[7] Heejo Lee,et al. Botnet Detection by Monitoring Group Activities in DNS Traffic , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[8] Basheer Al-Duwairi,et al. BotDigger: A Fuzzy Inference System for Botnet Detection , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.
[9] Burkhard Stiller,et al. Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection , 2008, AIMS.
[10] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[11] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[12] Kevin W. Hamlen,et al. Flow-based identification of botnet traffic by mining multiple log files , 2008, 2008 First International Conference on Distributed Framework and Applications.
[13] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[14] Dae-il Jang,et al. Analysis of HTTP2P botnet: case study waledac , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).
[15] Su Chang,et al. P2P botnet detection using behavior clustering & statistical tests , 2009, AISec '09.
[16] Brandon Shirley,et al. Sub-Botnet Coordination Using Tokens in a Switched Network , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[17] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[18] David Lee,et al. Traceback Attacks in Cloud -- Pebbletrace Botnet , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[19] Jian Kang,et al. Detecting New Decentralized Botnet Based on Kalman Filter and Multi-chart CUSUM Amplification , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[20] Wen-Hwa Liao,et al. Peer to Peer Botnet Detection Using Data Mining Scheme , 2010, 2010 International Conference on Internet Technology and Applications.
[21] Paul Barford,et al. Toward Botnet Mesocosms , 2007, HotBots.
[22] Vrizlynn L. L. Thing,et al. A Survey of Bots Used for Distributed Denial of Service Attacks , 2007, SEC.
[23] Hossein Rouhani Zeidanloo,et al. Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.
[24] Wei Jiang,et al. Botnet: Survey and Case Study , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).
[25] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.
[26] Joseph B. Kadane,et al. Using uncleanliness to predict future botnet addresses , 2007, IMC '07.
[27] Alex Brodsky,et al. A Distributed Content Independent Method for Spam Detection , 2007, HotBots.
[28] R. Schoof,et al. Detecting peer-to-peer botnets , 2007 .
[29] Leyla Bilge,et al. Automatically Generating Models for Botnet Detection , 2009, ESORICS.
[30] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[31] Sureswaran Ramadass,et al. A Survey of Botnet and Botnet Detection , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.