AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats
暂无分享,去创建一个
Qiang Li | Dong Guo | Bing Li | Guanghua Yan
[1] Zhao Qin. Efficient Algorithm of Canopy-Kmeans Based on Hadoop Platform , 2014 .
[2] Babak Rahbarinia,et al. Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[3] Ting Yu,et al. Discovering Malicious Domains through Passive DNS Data Graph Analysis , 2016, AsiaCCS.
[4] Jianfang Li,et al. The study of APT attack stage model , 2016, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS).
[5] Michele Colajanni,et al. Analysis of high volumes of network traffic for Advanced Persistent Threat detection , 2016, Comput. Networks.
[6] Yong Shi,et al. Malicious Domain Name Detection Based on Extreme Machine Learning , 2017, Neural Processing Letters.
[7] Li Qiang,et al. Detection of Covert and Suspicious DNS Behavior in Advanced Persistent Threats , 2017 .
[8] Cheng Huang,et al. Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions , 2017, AsiaCCS.
[9] William H. Sanders,et al. An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[10] Yacin Nadji. Understanding DNS-based criminal infrastructure for informing takedowns , 2015 .
[11] Guowu Yang,et al. Identifying APT Malware Domain Based on Mobile DNS Logging , 2017 .
[12] Huayu Zhang,et al. Improved K-means algorithm based on density Canopy , 2018, Knowl. Based Syst..
[13] B. Wu,et al. Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis , 2015, IEEE Access.
[14] Michele Colajanni,et al. Countering Advanced Persistent Threats through security intelligence and big data analytics , 2016, 2016 8th International Conference on Cyber Conflict (CyCon).
[15] H. Vincent Poor,et al. Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study , 2017, IEEE Journal on Selected Areas in Communications.
[16] Zhou Li,et al. Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data , 2014, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.