Detection of botnets using combined host- and network-level information
暂无分享,去创建一个
Kang G. Shin | Yuanyuan Zeng | Xin Hu | K. Shin | Xin Hu | Y. Zeng
[1] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[2] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Michael K. Reiter,et al. Traffic Aggregation for Malware Detection , 2008, DIMVA.
[4] Scott A. Weems,et al. EEG Correlates of Hemispheric Word Recognition , 2008 .
[5] Keiji Iramina,et al. MEG and EEG evoked by verbal cognitive tasks , 1996 .
[6] Hsuan-Tien Lin,et al. A note on Platt’s probabilistic outputs for support vector machines , 2007, Machine Learning.
[7] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[8] G. Pfurtscheller,et al. Brain-Computer Interfaces for Communication and Control. , 2011, Communications of the ACM.
[9] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[10] Kang G. Shin,et al. Containment of network worms via per-process rate-limiting , 2008, SecureComm.
[11] Gert Pfurtscheller,et al. Motor imagery and direct brain-computer communication , 2001, Proc. IEEE.
[12] Neil J. Hurley,et al. Single-trial EEG classification for brain-computer interface using wavelet decomposition , 2005, 2005 13th European Signal Processing Conference.
[13] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[14] Phillip A. Porras,et al. A Multi-perspective Analysis of the Storm ( Peacomm ) Worm , 2007 .
[15] Stephanie Forrest,et al. Automated response using system-call delays , 2000 .
[16] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[17] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[18] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[19] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[20] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[21] W. Timothy Strayer,et al. Detecting Botnets with Tight Command and Control , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[22] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.