Hybrid detection and tracking of fast-flux botnet on domain name system traffic
暂无分享,去创建一个
[1] Christopher Leckie,et al. Collaborative Detection of Fast Flux Phishing Domains , 2009, J. Networks.
[2] Jing Tao,et al. Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service , 2012, ACSAC '12.
[3] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[4] Lorenzo Martignoni,et al. FluXOR: Detecting and Monitoring Fast-Flux Service Networks , 2008, DIMVA.
[5] Wenke Lee,et al. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces , 2009, 2009 Annual Computer Security Applications Conference.
[6] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[7] Etienne Stalmans,et al. A framework for DNS based detection and mitigation of malware infections on a network , 2011, 2011 Information Security for South Africa.
[8] Thorsten Holz,et al. As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[9] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[10] Chun-Ying Huang,et al. Fast-Flux Bot Detection in Real Time , 2010, RAID.
[11] Hahn-Ming Lee,et al. Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection , 2010, ASIACCS '10.
[12] Jason Lee,et al. Detection of Fast Flux Service Networks , 2011, AISC.