Botnet detection based on traffic behavior analysis and flow intervals
暂无分享,去创建一个
Ali A. Ghorbani | Wei Lu | Issa Traoré | David Zhao | Sherif Saad | Bassam Sayed | Daniel Garant | A. Ghorbani | I. Traoré | Sherif Saad | Dan Garant | Wei-Zhou Lu | B. Sayed | David Zhao
[1] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.
[2] José Carlos Brustoloni,et al. Bayesian bot detection based on DNS traffic similarity , 2009, SAC '09.
[3] Zhang Shunyi,et al. P2P Traffic Identification Technique , 2007, CIS.
[4] Basheer Al-Duwairi,et al. BotDigger: A Fuzzy Inference System for Botnet Detection , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.
[5] Ali A. Ghorbani,et al. Peer to Peer Botnet Detection Based on Flow Intervals , 2012, SEC.
[6] Bhavani M. Thuraisingham. Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic , 2008, ISI.
[7] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[8] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[9] Konstantina Papagiannaki,et al. Exploiting Temporal Persistence to Detect Covert Botnet Channels , 2009, RAID.
[10] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[11] Jie Ma,et al. Measuring Peer-to-Peer Botnets Using Control Flow Stability , 2009, 2009 International Conference on Availability, Reliability and Security.
[12] Hossein Rouhani Zeidanloo. Botnet Detection by Monitoring Common Network Behaviors , 2012 .
[13] István Szabó,et al. On the Validation of Traffic Classification Algorithms , 2008, PAM.
[14] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[15] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[16] Guanming Lu,et al. A Novel P2P Traffic Identification Scheme Based on Support Vector Machine Fuzzy Network , 2009, 2009 Second International Workshop on Knowledge Discovery and Data Mining.
[17] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.
[18] Sureswaran Ramadass,et al. A Survey of Botnet and Botnet Detection , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[19] Ali A. Ghorbani,et al. Detecting P2P botnets through network behavior analysis and machine learning , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[20] Leyla Bilge,et al. Automatically Generating Models for Botnet Detection , 2009, ESORICS.
[21] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[22] Ge Yu,et al. Online Botnet Detection Based on Incremental Discrete Fourier Transform , 2010, J. Networks.
[23] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[24] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[25] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[26] Brent Byunghoon Kang,et al. The waledac protocol: The how and why , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[27] Shouhuai Xu,et al. A Framework for Understanding Botnets , 2009, 2009 International Conference on Availability, Reliability and Security.