Detecting Malware Based on DNS Graph Mining
暂无分享,去创建一个
Futai Zou | Siyu Zhang | Weixiong Rao | Ping Yi | P. Yi | Weixiong Rao | Futai Zou | Siyu Zhang
[1] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[2] J. Laurie Snell,et al. Markov Random Fields and Their Applications , 1980 .
[3] Jun Li,et al. On the state of IP spoofing defense , 2009, TOIT.
[4] Wenke Lee,et al. Detecting Malware Domains at the Upper DNS Hierarchy , 2011, USENIX Security Symposium.
[5] Judea Pearl,et al. Reverend Bayes on Inference Engines: A Distributed Hierarchical Approach , 1982, AAAI.
[6] Radu State,et al. RiskRank: Security risk ranking for IP flow records , 2010, 2010 International Conference on Network and Service Management.
[7] William T. Freeman,et al. Understanding belief propagation and its generalizations , 2003 .
[8] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[9] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[10] Christos Faloutsos,et al. Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.
[11] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[12] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[13] Thorsten Holz,et al. As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[14] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[15] Radu State,et al. BotCloud: Detecting botnets using MapReduce , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[16] Joseph M. Hellerstein,et al. GraphLab: A New Framework For Parallel Machine Learning , 2010, UAI.
[17] Florian Weimer,et al. Passive DNS Replication , 2005 .
[18] Vinod Yegneswaran,et al. An empirical reexamination of global DNS behavior , 2013, SIGCOMM.
[19] Christos Faloutsos,et al. Polonium: Tera-Scale Graph Mining and Inference for Malware Detection , 2011 .
[20] Felix C. Freiling,et al. On Botnets That Use DNS for Command and Control , 2011, 2011 Seventh European Conference on Computer Network Defense.