Network Connectivity Graph for Malicious Traffic Dissection
暂无分享,去创建一个
Elena Baralis | Marco Mellia | Gaspar Modelo-Howard | Sabyasachi Saha | Luigi Grimaudo | Enrico Bocchi | Sung-Ju Lee | Stanislav Miskovic | M. Mellia | Gaspar Modelo-Howard | S. Miskovic | Sabyasachi Saha | E. Bocchi | L. Grimaudo | Sung-ju Lee | Elena Baralis
[1] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[2] Wenke Lee,et al. Connected Colors: Unveiling the Structure of Criminal Networks , 2013, RAID.
[3] Michalis Faloutsos,et al. PhishDef: URL names say it all , 2010, 2011 Proceedings IEEE INFOCOM.
[4] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[5] Sandeep Yadav,et al. Detecting Malicious Domains via Graph Inference , 2014, AISec '14.
[6] Radu State,et al. BotTrack: Tracking Botnets Using NetFlow and PageRank , 2011, Networking.
[7] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[8] Christopher Krügel,et al. Nazca: Detecting Malware Distribution in Large-Scale Networks , 2014, NDSS.
[9] Norbert Pohlmann,et al. CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis , 2013, Comput. Networks.
[10] Jin Cao,et al. Identifying suspicious activities through DNS failure graph analysis , 2010, The 18th IEEE International Conference on Network Protocols.
[11] Tim Berners-Lee,et al. Hypertext transfer protocol--http/i , 1993 .
[12] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[13] H. Mannila,et al. Discovering all most specific sentences , 2003, TODS.
[14] Lei Liu,et al. Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[15] Wenke Lee,et al. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces , 2009, 2009 Annual Computer Security Applications Conference.
[16] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[17] Paul V. Mockapetris,et al. Domain names: Concepts and facilities , 1983, RFC.
[18] Anthony K. H. Tung,et al. Carpenter: finding closed patterns in long biological datasets , 2003, KDD '03.