4 Advanced Methods for Botnet Intrusion Detection Systems
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. Defending a Computer System Using Autonomous Agents , 1995 .
[2] Salvatore J. Stolfo,et al. JAM: Java Agents for Meta-Learning over Distributed Databases , 1997, KDD.
[3] Tony White,et al. Mobile agents for network management , 1998, IEEE Communications Surveys & Tutorials.
[4] Vasant Honavar,et al. Intelligent agents for intrusion detection , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[5] Giovanni Vigna,et al. Understanding Code Mobility , 1998, IEEE Trans. Software Eng..
[6] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[7] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[8] Peter Mell,et al. Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems , 1999, Recent Advances in Intrusion Detection.
[9] Shigeki Goto,et al. The Implementation of IDA: An Intrusion Detection Agent System , 1999 .
[10] Athanasios T. Karygiannis,et al. Mobile Agent Security | NIST , 1999 .
[11] Luci Pirmez,et al. Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications , 1999, Recent Advances in Intrusion Detection.
[12] Thomas Magedanz,et al. The Grasshopper Mobile Agent Platform Enabling Shortterm Active Broadband Intelligent Network Implementation , 1999, IWAN.
[13] Daniela Rus,et al. Using mobile agents for analyzing intrusion in computer networks , 2001 .
[14] Christopher Krügel,et al. SPARTA A Mobile Agent based Intrusion Detection System , 2001 .
[15] Christopher Krügel,et al. Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks , 2001 .
[16] David Billard,et al. Computer System Immunity using Mobile Agents , 2001 .
[17] Giovanni Vigna,et al. An Intrusion Detection System for Aglets , 2002, Mobile Agents.
[18] Delbert Hart,et al. A P2P intrusion detection system based on mobile agents , 2004, ACM-SE 42.
[19] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[20] Giovanni Vigna. Mobile agents: ten reasons for failure , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[21] Chengqi Zhang,et al. MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agent , 2004 .
[22] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[23] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[24] Debin Gao,et al. Behavioral Distance for Intrusion Detection , 2005, RAID.
[25] Abhishek Gupta,et al. APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System , 2005, MATA.
[26] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[27] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[28] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.
[29] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[30] Ming-Yang Kao,et al. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[31] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[32] Ken Chiang,et al. A Case Study of the Rustock Rootkit and Spam Bot , 2007, HotBots.
[33] Yuanyuan Zhou,et al. Sweeper: a lightweight end-to-end system for defending against fast worms , 2007, EuroSys '07.
[34] Zhenkai Liang,et al. Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation , 2007, USENIX Security Symposium.
[35] Tal Garfinkel,et al. Compatibility Is Not Transparency: VMM Detection Myths and Realities , 2007, HotOS.
[36] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[37] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[38] Neil Daswani,et al. The Anatomy of Clickbot.A , 2007, HotBots.
[39] David A. Maltz,et al. AS-Based Accountability as a Cost-Effective DDoS Defense , 2007, HotBots.
[40] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[41] Paul Barford,et al. Toward Botnet Mesocosms , 2007, HotBots.
[42] Alex Brodsky,et al. A Distributed Content Independent Method for Spam Detection , 2007, HotBots.
[43] Mohammed S. Alam,et al. APHIDS++: A Mobile Agent Based Intrusion Detection System , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.
[44] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[45] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[46] John Aycock,et al. Army of Botnets , 2007, NDSS.
[47] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[48] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[49] John Bambenek,et al. Botnets and Proactive System Defense , 2008, Botnet Detection.
[50] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[51] Geoff Hulten,et al. Spamming botnets: signatures and characteristics , 2008, SIGCOMM '08.
[52] John C. Mitchell,et al. Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods , 2008, WOOT.
[53] Xin Liu,et al. To filter or to authorize: network-layer DoS defense against multimillion-node botnets , 2008, SIGCOMM '08.
[54] W. Timothy Strayer,et al. Botnet Detection Based on Network Behavior , 2008, Botnet Detection.
[55] Thorsten Holz,et al. As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[56] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[57] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[58] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[59] Abhinav Srivastava,et al. Evaluating email’s feasibility for botnet command and control , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[60] T. Holz,et al. Towards Next-Generation Botnets , 2008, 2008 European Conference on Computer Network Defense.
[61] Felix C. Freiling,et al. Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients , 2008, Sicherheit.
[62] Adrian Perrig,et al. Towards Sound Detection of Virtual Machines , 2008, Botnet Detection.
[63] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[64] Felix C. Freiling,et al. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones , 2009, ESORICS.
[65] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.