Detecting Cobalt Strike beacons in NetFlow data
暂无分享,去创建一个
[1] Matt Holdrege,et al. IP Network Address Translator (NAT) Terminology and Considerations , 1999, RFC.
[2] B.J. Wood,et al. Red Teaming of advanced information assurance concepts , 1999, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[3] Benoit Claise,et al. Cisco Systems NetFlow Services Export Version 9 , 2004, RFC.
[4] Satoshi Kondo,et al. Botnet Traffic Detection Techniques by C&C Session Classification Using SVM , 2007, IWSEC.
[5] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[6] Chen Lu,et al. Botnet traffic detection using hidden Markov models , 2011, CSIIRW '11.
[7] Jasper Snoek,et al. Practical Bayesian Optimization of Machine Learning Algorithms , 2012, NIPS.
[8] Norbert Pohlmann,et al. CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis , 2013, Comput. Networks.
[9] J. Dreijer. StealthWare-Social Engineering Malware , 2015 .
[10] Thomas Shrimpton,et al. Marionette: A Programmable Network Traffic Obfuscation System , 2015, USENIX Security Symposium.
[11] Thomas Ristenpart,et al. Network Traffic Obfuscation and Automated Internet Censorship , 2016, IEEE Security & Privacy.
[12] Tobias Scheffer,et al. Malware Detection by HTTPS Traffic Analysis , 2017 .
[13] Ali Dehghantanha,et al. BoTShark: A Deep Learning Approach for Botnet Traffic Detection , 2018 .
[14] Amazon CloudFront , 2018, AWS® Certified Advanced Networking Official Study Guide.
[15] Maria Rigaki,et al. Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[16] Dijiang Huang,et al. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities , 2019, IEEE Communications Surveys & Tutorials.