EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection
暂无分享,去创建一个
Guofei Gu | Seungwon Shin | Zhaoyan Xu | G. Gu | Zhaoyan Xu | Seungwon Shin
[1] Randy H. Katz,et al. BINDER: An Extrusion-Based Break-In Detector for Personal Computers , 2005, USENIX Annual Technical Conference, General Track.
[2] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[3] John C. Mitchell,et al. Characterizing Bots' Remote Control Behavior , 2007, DIMVA.
[4] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[5] Santosh S. Vempala,et al. Chipping Away at Censorship Firewalls with User-Generated Content , 2010, USENIX Security Symposium.
[6] Abhinav Srivastava,et al. Evaluating email’s feasibility for botnet command and control , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[7] Lei Liu,et al. BotTracer: Execution-Based Bot-Like Malware Detection , 2008, ISC.
[8] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[9] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[10] Aleksandar Kuzmanovic,et al. Unconstrained endpoint profiling (googling the internet) , 2008, SIGCOMM '08.
[11] Christopher Krügel,et al. AccessMiner: using system-centric models for malware protection , 2010, CCS '10.
[12] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[13] Leyla Bilge,et al. Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains , 2014, TSEC.
[14] Hari Balakrishnan,et al. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks , 2009, NSDI.
[15] Michael K. Reiter,et al. Traffic Aggregation for Malware Detection , 2008, DIMVA.
[16] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[17] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[18] Dawn Xiaodong Song,et al. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering , 2009, CCS.
[19] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[20] Kang G. Shin,et al. Detection of botnets using combined host- and network-level information , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[21] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[22] Aaron Hackworth,et al. Botnets as a Vehicle for Online Crimes , 2006 .
[23] Qiang Yang,et al. SVM: Support Vector Machines , 2011 .
[24] John C. Mitchell,et al. Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods , 2008, WOOT.
[25] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[26] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[27] John C. Mitchell,et al. Characterizing the Remote Control Behavior of Bots , 2007 .
[28] Nicolas Ianelli,et al. Botnets as a Vehicle for Online Crime , 2007 .
[29] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.