A Comprehensive Measurement Study of Domain Generating Malware
暂无分享,去创建一个
Johannes Bader | Khaled Yakdan | Elmar Gerhards-Padilla | Daniel Plohmann | Michael Klatt | D. Plohmann | E. Gerhards-Padilla | Khaled Yakdan | J. Bader | M. Klatt
[1] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[2] Stefano Zanero,et al. Phoenix: DGA-Based Botnet Tracking and Intelligence , 2014, DIMVA.
[3] Miranda Mowbray,et al. Finding Domain-Generation Algorithms by Looking at Length Distribution , 2014, 2014 IEEE International Symposium on Software Reliability Engineering Workshops.
[4] Herbert Bos,et al. Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).
[5] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[6] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[7] Leyla Bilge,et al. Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains , 2014, TSEC.
[8] Elmar Gerhards-Padilla,et al. Automatic Extraction of Domain Name Generation Algorithms from Current Malware , 2012 .
[9] Dawn Song,et al. Malware , 2004, Encyclopedia of Cryptography and Security.
[10] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[11] Elmar Gerhards-Padilla,et al. Behavior-Driven Development in Malware Analysis , 2016 .
[12] Kyle Sanders,et al. WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS , 2014 .
[13] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[14] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[15] William H. Press,et al. Numerical Recipes 3rd Edition: The Art of Scientific Computing , 2007 .
[16] Herbert Bos,et al. SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets , 2013, 2013 IEEE Symposium on Security and Privacy.
[17] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[18] Wouter Joosen,et al. Parking Sensors: Analyzing and Detecting Parked Domains , 2015, NDSS.
[19] Wenke Lee,et al. Beheading hydras: performing effective botnet takedowns , 2013, CCS.
[20] S. K. Park,et al. Random number generators: good ones are hard to find , 1988, CACM.
[21] Dennis Andriesse,et al. P 2 PWNED : Modeling and Evaluating the Resilience of Peer-to-Peer Botnets , 2013 .