An Overview of Modern Botnets
暂无分享,去创建一个
[1] David M. Nicol,et al. The Koobface botnet and the rise of social malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[2] Farnam Jahanian,et al. A Survey of Botnet Technology and Defenses , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[3] A. Nur Zincir-Heywood,et al. Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.
[4] Lachlan Kang. Efficient botnet herding within the Tor network , 2014, Journal of Computer Virology and Hacking Techniques.
[5] Dae-il Jang,et al. Evasion technique and detection of malicious botnet , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[6] Amr M. Youssef,et al. Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[7] B. S. Manoj,et al. Fast-flux botnet detection from network traffic , 2014, 2014 Annual IEEE India Conference (INDICON).
[8] M. Eslahi,et al. MoBots: A new generation of botnets on mobile devices and networks , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).
[9] Rosli Salleh,et al. Mobile Botnet Attacks: A Thematic Taxonomy , 2014, WorldCIST.
[10] Shujun Li,et al. A novel anti-phishing framework based on honeypots , 2009, 2009 eCrime Researchers Summit.
[11] Ali A. Ghorbani,et al. SMS mobile botnet detection using a multi-agent system: research in progress , 2014, ACySE '14.
[12] Scott J. Shackelford. From Nuclear War to Net War: Analogizing Cyber Attacks in International Law , 2009 .
[13] Zhuo Lu,et al. How can botnets cause storms? Understanding the evolution and impact of mobile botnets , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[14] Les Smith,et al. Semi-supervised Time Series Modeling for Real-Time Flux Domain Detection on Passive DNS Traffic , 2014, MLDM.
[15] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.
[16] Ricardo J. Rodríguez,et al. Detection of Intrusions and Malware, and Vulnerability Assessment , 2016, Lecture Notes in Computer Science.
[17] Zhen Ling,et al. TorWard: Discovery of malicious traffic over Tor , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[18] Yongzheng Zhang,et al. DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance , 2014, 2014 9th IEEE International Conference on Networking, Architecture, and Storage.
[19] Fu-Hau Hsu,et al. Detect Fast-Flux Domains Through Response Time Differences , 2014, IEEE Journal on Selected Areas in Communications.
[20] Stefano Zanero,et al. Phoenix: DGA-Based Botnet Tracking and Intelligence , 2014, DIMVA.
[21] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[22] Reza Sharifnya,et al. DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic , 2015, Digit. Investig..
[23] David W. McDonald,et al. Dissecting a Social Botnet: Growth, Content and Influence in Twitter , 2015, CSCW.
[24] Jason Livingood,et al. Recommendations for the Remediation of Bots in ISP Networks , 2012, RFC.
[25] Johannes M. Bauer,et al. The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data , 2010, WEIS.