Mining agile DNS traffic using graph analysis for cybercrime detection
暂无分享,去创建一个
[1] Francisco Casacuberta,et al. Topology of Strings: Median String is NP-Complete , 1999, Theor. Comput. Sci..
[2] Kang G. Shin,et al. Measurement and analysis of global IP-usage patterns of fast-flux botnets , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Rudolf Bayer,et al. Symmetric binary B-Trees: Data structure and maintenance algorithms , 1972, Acta Informatica.
[4] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[5] Roberto Perdisci,et al. Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis , 2012, IEEE Transactions on Dependable and Secure Computing.
[6] Ferenc Kruzslicz. Improved Greedy Algorithm for Computing Approximate Median Strings , 1999, Acta Cybern..
[7] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[8] Wilfried N. Gansterer,et al. Modeling DNS agility with DNSMap , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[9] Wenke Lee,et al. Detecting Malware Domains at the Upper DNS Hierarchy , 2011, USENIX Security Symposium.
[10] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[11] Heejo Lee,et al. BotGAD: detecting botnets by capturing group activities in network traffic , 2009, COMSWARE '09.
[12] John Aycock. What’s in a name. . . generator? , 2012, Journal in Computer Virology.
[13] Andreas Berger,et al. Assessing the Real-World Dynamics of DNS , 2012, TMA.
[14] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[15] L. da F. Costa,et al. Characterization of complex networks: A survey of measurements , 2005, cond-mat/0505185.
[16] R. Villamarin-Salomon,et al. Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[17] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[18] Kang G. Shin,et al. Good guys vs. Bot Guise: Mimicry attacks against fast-flux detection systems , 2011, 2011 Proceedings IEEE INFOCOM.
[19] Lorenzo Martignoni,et al. FluXOR: Detecting and Monitoring Fast-Flux Service Networks , 2008, DIMVA.
[20] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[21] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[22] Christian Rossow,et al. RUHR-UNIVERSITÄT BOCHUM , 2014 .
[23] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.