Large-scale DNS data analysis
暂无分享,去创建一个
[1] Florian Weimer,et al. Passive DNS Replication , 2005 .
[2] Duane Wessels,et al. Passive Monitoring of DNS Anomalies , 2007, DIMVA.
[3] Sandeep Yadav,et al. Winning with DNS Failures: Strategies for Faster Botnet Detection , 2011, SecureComm.
[4] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[5] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[6] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[7] Wenke Lee,et al. Detecting Malware Domains at the Upper DNS Hierarchy , 2011, USENIX Security Symposium.
[8] Vinton G. Cerf,et al. Guidelines for Internet Measurement Activities , 1991, RFC.
[9] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[10] Wenke Lee,et al. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces , 2009, 2009 Annual Computer Security Applications Conference.
[11] Wenke Lee,et al. Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries , 2008, CCS.
[12] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[13] Jonathan M. Spring,et al. The Impact of Passive DNS Collection on End-user Privacy , 2012 .
[14] Remco van Mook,et al. Measures for Making DNS More Resilient against Forged Answers , 2009, RFC.
[15] Paul V. Mockapetris,et al. Domain names: Concepts and facilities , 1983, RFC.
[16] Niels Provos,et al. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority , 2008, NDSS.
[17] Vivek S. Pai,et al. ConfiDNS: Leveraging Scale and History to Improve DNS Security , 2006, WORLDS.
[18] Fabian Monrose,et al. DNS Prefetching and Its Privacy Implications: When Good Things Go Bad , 2010, LEET.