Phoenix: DGA-Based Botnet Tracking and Intelligence
暂无分享,去创建一个
Stefano Zanero | Federico Maggi | Lorenzo Cavallaro | Stefano Schiavoni | L. Cavallaro | S. Zanero | F. Maggi | S. Schiavoni
[1] Eric Jones,et al. SciPy: Open Source Scientific Tools for Python , 2001 .
[2] Wenke Lee,et al. Detecting Malware Domains at the Upper DNS Hierarchy , 2011, USENIX Security Symposium.
[3] Todd M. Bailey,et al. Determinants of wordlikeness: Phonotactics or lexical neighborhoods? , 2001 .
[4] Lorenzo Martignoni,et al. FluXOR: Detecting and Monitoring Fast-Flux Service Networks , 2008, DIMVA.
[5] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[6] Sandeep Yadav,et al. Winning with DNS Failures: Strategies for Faster Botnet Detection , 2011, SecureComm.
[7] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[8] Leyla Bilge,et al. Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains , 2014, TSEC.
[9] Sandeep Yadav,et al. Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis , 2012, IEEE/ACM Transactions on Networking.
[10] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[11] Christian Platzer,et al. Detecting malware's failover C&C strategies with squeeze , 2011, ACSAC '11.
[12] Leyla Bilge,et al. Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis , 2012, ACSAC '12.
[13] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[14] Mark Newman,et al. Networks: An Introduction , 2010 .
[15] Roberto Perdisci,et al. Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis , 2012, IEEE Transactions on Dependable and Secure Computing.
[16] Stefano Zanero,et al. Tracking and Characterizing Botnets Using Automatically Generated Domains , 2013, ArXiv.
[17] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[18] Robert J. Scholes. Phonotactic grammaticality / by Robert J. Scholes , 1966 .
[19] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[20] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[21] Herbert Bos,et al. Prudent Practices for Designing Malware Experiments: Status Quo and Outlook , 2012, 2012 IEEE Symposium on Security and Privacy.
[22] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .