GMAD: Graph-based Malware Activity Detection by DNS traffic analysis
暂无分享,去创建一个
[1] Heejo Lee,et al. Tracking multiple C&C botnets by analyzing DNS traffic , 2010, 2010 6th IEEE Workshop on Secure Network Protocols.
[2] Sandeep Yadav,et al. Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis , 2012, IEEE/ACM Transactions on Networking.
[3] Phillip Lin. FireEye: Anatomy of the Mega-D takedown , 2009 .
[4] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[5] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.
[6] Keisuke Ishibashi,et al. Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries , 2010, LEET.
[7] Arvind Krishnamurthy,et al. Studying Spamming Botnets Using Botlab , 2009, NSDI.
[8] Satoru Kawai,et al. An Algorithm for Drawing General Undirected Graphs , 1989, Inf. Process. Lett..
[9] José Carlos Brustoloni,et al. Bayesian bot detection based on DNS traffic similarity , 2009, SAC '09.
[10] H. S. Heaps,et al. Information retrieval, computational and theoretical aspects , 1978 .
[11] Alexander Dekhtyar,et al. Information Retrieval , 2018, Lecture Notes in Computer Science.
[12] Heejo Lee,et al. BotGAD: detecting botnets by capturing group activities in network traffic , 2009, COMSWARE '09.
[13] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[14] Shouhuai Xu,et al. Analyzing DNS activities of bot processes , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[15] Fang Yu,et al. Intention and Origination: An Inside Look at Large-Scale Bot Queries , 2013, NDSS.
[16] Jin Cao,et al. Identifying suspicious activities through DNS failure graph analysis , 2010, The 18th IEEE International Conference on Network Protocols.
[17] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[18] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[19] Wenke Lee,et al. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces , 2009, 2009 Annual Computer Security Applications Conference.
[20] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[21] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[22] Heejo Lee,et al. Identifying botnets by capturing group activities in DNS traffic , 2012, Comput. Networks.
[23] Akira Yamada,et al. Web Tracking Site Detection Based on Temporal Link Analysis , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.