Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
暂无分享,去创建一个
[1] Hossein Rouhani Zeidanloo,et al. A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[2] Wen-Hwa Liao,et al. Peer to Peer Botnet Detection Using Data Mining Scheme , 2010, 2010 International Conference on Internet Technology and Applications.
[3] Hossein Rouhani Zeidanloo,et al. A proposed framework for P2P botnet detection , 2010 .
[4] Ping Wang,et al. Peer-to-Peer Botnets , 2010, Handbook of Information and Communication Security.
[5] Beng Chin Ooi,et al. Peer-to-Peer Computing - Principles and Applications , 2009 .
[6] Dan Liu,et al. A P2P-Botnet detection model and algorithms based on network streams analysis , 2010, 2010 International Conference on Future Information Technology and Management Engineering.
[7] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[8] Hsinchun Chen,et al. Botnets, and the cybercriminal underground , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[9] Glen E. Clarke. CCENT Certification All-In-One For Dummies , 2010 .
[10] Akihiro Nakao,et al. A Survey on the Use of Traffic Traces to Battle Internet Threats , 2010, 2010 Third International Conference on Knowledge Discovery and Data Mining.
[11] Y. Robiah,et al. Threshold Verification Technique for Network Intrusion Detection System , 2009, ArXiv.