BotCapturer: Detecting Botnets based on Two-Layered Analysis with Graph Anomaly Detection and Network Traffic Clustering
暂无分享,去创建一个
Yang Wang | Wei Wang | Ya Liu | Shuangmao Yang | Xinlu Tan | Yang Wang | Wei Wang | Xi-tao Tan | Ya Liu | Shuangmao Yang
[1] Xiangliang Zhang,et al. Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks , 2014, Knowl. Based Syst..
[2] Xiangliang Zhang,et al. Fast intrusion detection based on a non-negative matrix factorization model , 2009, J. Netw. Comput. Appl..
[3] Xiangliang Zhang,et al. Processing of massive audit data streams for real-time anomaly intrusion detection , 2008, Comput. Commun..
[4] Xiangliang Zhang,et al. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers , 2018, Future Gener. Comput. Syst..
[5] G. Kirubavathi,et al. Botnets: A Study and Analysis , 2014 .
[6] Ali A. Ghorbani,et al. Botnet detection based on traffic behavior analysis and flow intervals , 2013, Comput. Secur..
[7] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[8] C. Faloutsos,et al. Anomaly Detection in Large Graphs , 2020 .
[9] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[10] Heejo Lee,et al. Identifying botnets by capturing group activities in DNS traffic , 2012, Comput. Networks.
[11] Philip S. Yu,et al. Outlier detection in graph streams , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[12] Vinod Yegneswaran,et al. Using Failure Information Analysis to Detect Enterprise Zombies , 2009, SecureComm.
[13] José M. F. Moura,et al. An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic , 2013, Journal of advanced research.
[14] Xiangliang Zhang,et al. Characterizing Android apps' behavior for effective detection of malapps at large scale , 2017, Future Gener. Comput. Syst..
[15] Xiangliang Zhang,et al. Abstracting massive data for lightweight intrusion detection in computer networks , 2016, Inf. Sci..
[16] Hans-Peter Kriegel,et al. A survey on unsupervised outlier detection in high‐dimensional numerical data , 2012, Stat. Anal. Data Min..
[17] Steven Gianvecchio,et al. Measurement and Classification of Humans and Bots in Internet Chat , 2008, USENIX Security Symposium.
[18] Xiangliang Zhang,et al. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection , 2014, IEEE Transactions on Information Forensics and Security.
[19] Emmanuel Müller,et al. Focused clustering and outlier detection in large attributed graphs , 2014, KDD.