Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks
暂无分享,去创建一个
Feng Qian | Peng Wang | Raheem A. Beyah | Damon McCoy | Xianghang Mi | Xiaofeng Wang | Xiaojing Liao | Sumayah A. Alrwais | Xiaofeng Wang | Damon McCoy | R. Beyah | Xiaojing Liao | Xianghang Mi | Feng Qian | Peng Wang
[1] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[2] Stefano Zanero,et al. BURN: baring unknown rogue networks , 2011, VizSec '11.
[3] Joseph B. Kadane,et al. Using uncleanliness to predict future botnet addresses , 2007, IMC '07.
[4] Craig A. Shue,et al. Abnormally Malicious Autonomous Systems and Their Internet Connectivity , 2012, IEEE/ACM Transactions on Networking.
[5] Raheem A. Beyah,et al. Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service , 2016, CCS.
[6] Paul Barford,et al. Spatial-Temporal Characteristics of Internet Malicious Sources , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[7] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[8] Nick Feamster,et al. PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration , 2016, CCS.
[9] Roberto Perdisci,et al. Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis , 2012, IEEE Transactions on Dependable and Secure Computing.
[10] Z. Berkay Celik,et al. Detection of Fast-Flux Networks using various DNS feature sets , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[11] Leyla Bilge,et al. Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains , 2014, TSEC.
[12] Craig A. Shue,et al. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Guang Cheng,et al. Detecting domain-flux botnet based on DNS traffic features in managed network , 2016, Secur. Commun. Networks.
[14] Fang Yu,et al. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures , 2013, 2013 IEEE Symposium on Security and Privacy.
[15] Nick Feamster,et al. ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes , 2015, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
[16] Kevin C. Almeroth,et al. FIRE: FInding Rogue nEtworks , 2009, 2009 Annual Computer Security Applications Conference.
[17] Mingyan Liu,et al. On the Mismanagement and Maliciousness of Networks , 2014, NDSS.