BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
暂无分享,去创建一个
Guofei Gu | Wenke Lee | Roberto Perdisci | Junjie Zhang | Wenke Lee | R. Perdisci | G. Gu | Junjie Zhang
[1] Virgil D. Gligor,et al. A guide to understanding covert channel analysis of trusted systems , 1993 .
[2] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[3] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[4] Andrew W. Moore,et al. X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.
[5] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[7] Michalis Vazirgiannis,et al. c ○ 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. On Clustering Validation Techniques , 2022 .
[8] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[9] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[10] Wenke Lee,et al. Polymorphic Blending Attacks , 2006, USENIX Security Symposium.
[11] Dawn Song,et al. Malware Detection (Advances in Information Security) , 2006 .
[12] W. Timothy Strayer,et al. Detecting Botnets with Tight Command and Control , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[13] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[14] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[15] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[16] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.
[17] Aaron Hackworth,et al. Botnets as a Vehicle for Online Crimes , 2006 .
[18] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[19] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[20] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[21] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[22] Ken Chiang,et al. A Case Study of the Rustock Rootkit and Spam Bot , 2007, HotBots.
[23] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[24] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[25] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[26] Neil Daswani,et al. The Anatomy of Clickbot.A , 2007, HotBots.
[27] Stephanie Wehner,et al. Analyzing worms and network traffic using compression , 2005, J. Comput. Secur..
[28] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[29] Joseph B. Kadane,et al. Using uncleanliness to predict future botnet addresses , 2007, IMC '07.
[30] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[31] Wei Zou,et al. Characterizing the IRC-based Botnet Phenomenon , 2007 .
[32] Guofei Gu,et al. A Taxonomy of Botnet Structures , 2007, ACSAC.
[33] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[34] Nicolas Ianelli,et al. Botnets as a Vehicle for Online Crime , 2007 .
[35] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[36] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[37] Michael K. Reiter,et al. Traffic Aggregation for Malware Detection , 2008, DIMVA.
[38] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[39] Helen J. Wang,et al. Characterizing Botnets from Email Spam Records , 2008, LEET.