Botnet and botnet detection techniques in cyber realm
暂无分享,去创建一个
[1] Christopher Krügel,et al. BotFinder: finding bots in network traffic without deep packet inspection , 2012, CoNEXT '12.
[2] Bazara I. A. Barry,et al. Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph , 2013 .
[3] Tsuhan Chen,et al. Malicious web content detection by machine learning , 2010, Expert Syst. Appl..
[4] Aziz Mohaisen,et al. Measuring Botnets in the Wild: Some New Trends , 2015, AsiaCCS.
[5] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[6] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[7] Sureswaran Ramadass,et al. A Survey of Botnet and Botnet Detection , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[8] Sven Dietrich,et al. P2P as botnet command and control: A deeper insight , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[9] Nikita Borisov,et al. Stegobot: A Covert Social Network Botnet , 2011, Information Hiding.
[10] Chun-Ying Huang,et al. Fast-Flux Bot Detection in Real Time , 2010, RAID.
[11] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[12] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[13] Chia-Mei Chen,et al. Detecting botnet by anomalous traffic , 2015, J. Inf. Secur. Appl..
[14] Katsuyoshi Iida,et al. Detection Method of DNS-based Botnet Communication Using Obtained NS Record History , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[15] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[16] Shouhuai Xu,et al. Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures , 2010, ACNS.
[17] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[18] David J. Miller,et al. Botnet Detection Through Fine Flow Classification , 2011 .
[19] Dustin Burke,et al. Real-Time Detection of Fast Flux Service Networks , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[20] Heejo Lee,et al. BotGAD: detecting botnets by capturing group activities in network traffic , 2009, COMSWARE '09.