Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis
暂无分享,去创建一个
[1] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[2] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[3] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[4] B. Ripley,et al. Pattern Recognition , 1968, Nature.
[5] Nick Feamster,et al. Dynamics of Online Scam Hosting Infrastructure , 2009, PAM.
[6] Evi Nemeth,et al. DNS measurements at a root server , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[7] Vinod Yegneswaran,et al. An empirical reexamination of global DNS behavior , 2013, SIGCOMM.
[8] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[9] Václav Přenosil,et al. Advanced Persistent Threat Attack Detection: An Overview , 2014 .
[10] Wenke Lee,et al. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces , 2009, 2009 Annual Computer Security Applications Conference.
[11] Vinod Kumar,et al. Signature Based Intrusion Detection System Using SNORT , 2012 .
[12] Duane Wessels,et al. A day at the root of the internet , 2008, CCRV.
[13] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[14] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[15] Wenke Lee,et al. Detecting Malware Domains at the Upper DNS Hierarchy , 2011, USENIX Security Symposium.
[16] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[17] Etienne Stalmans,et al. A framework for DNS based detection and mitigation of malware infections on a network , 2011, 2011 Information Security for South Africa.
[18] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[19] Heejo Lee,et al. Botnet Detection by Monitoring Group Activities in DNS Traffic , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[20] Hassen Saïdi,et al. A Foray into Conficker's Logic and Rendezvous Points , 2009, LEET.