A Wide Scale Survey on Botnet
暂无分享,去创建一个
[1] Joseph Massi,et al. Botnet Detection and Mitigation , 2010 .
[2] Hossein Rouhani Zeidanloo,et al. Botnet Command and Control Mechanisms , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[3] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[4] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[5] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[6] Abhinav Srivastava,et al. Evaluating email’s feasibility for botnet command and control , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[7] Mourad Debbabi,et al. Insights from the analysis of the Mariposa botnet , 2010, 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS).
[8] Shun-Zheng Yu,et al. An HTTP Flooding Detection Method Based on Browser Behavior , 2006, 2006 International Conference on Computational Intelligence and Security.
[9] Heejo Lee,et al. Botnet Detection by Monitoring Group Activities in DNS Traffic , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[10] Sureswaran Ramadass,et al. A Survey of Botnet and Botnet Detection , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[11] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[12] Wei Yu,et al. A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks , 2008, 2008 IEEE International Conference on Communications.
[13] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.
[14] Hossein Rouhani Zeidanloo,et al. New Approach for Detection of IRC and P2P Botnets , 2010 .
[15] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[16] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[17] Yan Chen,et al. Botnet Research Survey , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.
[18] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[19] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[20] Yakov Rekhter,et al. Dynamic Updates in the Domain Name System (DNS UPDATE) , 1997, RFC.
[21] Hossein Rouhani Zeidanloo,et al. Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.
[22] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[23] Wei Jiang,et al. Botnet: Survey and Case Study , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).
[24] Christophe Kalt,et al. Internet Relay Chat: Client Protocol , 2000, RFC.
[25] Guofei Gu,et al. A Taxonomy of Botnet Structures , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[26] Jong-Soo Jang,et al. Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.
[27] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[28] Claudio Mazzariello. IRC Traffic Analysis for Botnet Detection , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[29] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[30] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[31] Mitsuaki Akiyama,et al. A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior , 2007, 2007 International Symposium on Applications and the Internet Workshops.
[32] Gregory P. Schaffer. Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats , 2006, IEEE Security & Privacy.
[33] Pranab Banerjee,et al. A Multi-Layered Approach to Botnet Detection , 2008, Security and Management.
[34] R. Villamarin-Salomon,et al. Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[35] Lei Wu,et al. Honeypot detection in advanced botnet attacks , 2010, Int. J. Inf. Comput. Secur..
[36] Hossein Rouhani Zeidanloo,et al. A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[37] Kim-Kwang Raymond Choo. Zombies and botnets , 2007 .
[38] Amr M. Youssef,et al. On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[39] Ravishankar Borgaonkar,et al. An Analysis of the Asprox Botnet , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.