参考文献
|
-
Android Customized ROM Information, http://androidspin.com/
-
Cyanogenmod, http://wiki.cyanogenmod.com/index.php?title=Main_Page
-
Snort, http://www.snort.org/
-
Android - An Open Handset Alliance Project, http://www.android.com/
-
Android Open Source Project, http://source.android.com/
-
http://www.exploit-db.com/exploits/16974/
-
台灣 Android 資源網站. http://android.cool3c.com/
-
Eclipse Integrated Development Environment, http://www.eclipse.org/
-
Cyber-TA. SRI Honeynet and BotHunter Malware Analysis Automatic Summary Analysis Table. http://www.cyber-ta.org/releases/malware-analysis/public/.
-
Android SDK, http://developer.android.com/index.html
-
Android Market, http://www.android.com/market/#app=com.farproc.wifi.analyzer
-
Analysis of a Botnet Takeover.IEEE Security & Privacy
-
Android 資訊雜誌, http://www.android-hk.com/about/
-
Jollen 的Android 專欄, http://www.jollen.org/Android/
-
Bacher, P.,Holz, T.,Kotter, M.,Wicherski, G.(2008).,未出版
-
Baecher, P.,Koetter, M.,Dornseif, M.,Freiling, F.(2006).The nepenthes platform: An efficient approach to collect malware.Proceedings of the 9 th International Symposium on Recent Advances in Intrusion Detection
-
Barford, P.,Yegneswaran, V.(2006).An inside look at botnets.Special Workshop on Malware Detection, Advances in Information Security
-
Berre, Arne-Jørgen(ed.),Gómez-Pérez, Asunción(ed.),Tutschku, Kurt(ed.),Fensel, Dieter(ed.)(2010).Future Internet - FIS 2010: Third Future Internet Symposium, Berlin, Germany, September 20-22, 2010. Proceedings
-
Binkley, J. R.,Singh, S.(2006).An algorithm for anomaly-based botnet detection.The 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'06)
-
Choi, H.,Lee, H.,Lee, H.,Kim, H.(2007).Botnet Detection by Monitoring Group Activities in DNS Traffic.Proc. 7th IEEE International Conference on Computer and Information Technology(CIT 2007)
-
Dagon, D.,Gu, G.,Lee, C.,Lee, W.(2007).A taxonomy of botnet structures.Proceedings of the 23 Annual Computer Security Applications Conference (ACSAC'07)
-
Gianvecchio, S.,Xie, M.,Wu, Z.,Wang, H.(2008).Measurement and Classification of Humans and Bots in Internet Chat.Proceedings of the 17th conference on Security symposium,CA, USA:
-
Giroire, F.,Chandrashekar, J.,Taft, N.,Schooler, E.,Papagiannaki, D.(2009).Exploiting Temporal Persistence to Detect Covert Botnet Channels.Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
-
Grizzard, J.B.,Sharma, V.,Nunnery, C.,Kang, B. ByungHoon,Dagon, D.(2007).Peer-to-peer botnets: overview and case study.Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets,Cambridge, MA:
-
Gu, G.,Perdisci, R.,Zhang, J.,Lee, W.(2008).Botminer: Clustering analysis of network traffic for protocol- and structure independent Botnet detection.Proc. 17th USENIX Security Symposium
-
Gu, G.,Porras, P.,Yegneswaran, V.,Fong, M.,Lee, W.(2007).BotHunter: Detecting malware infection through ids-driven dialog correlation.Proceedings of the 16th USENIX Security Symposium (Security'07)
-
Gu, G.,Zhang, J.,Lee, W.(2008).BotSniffer: Detecting botnet command and control channels in network traffic.Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)
-
Hua, Jingyu,Sakurai, Kouichi(2011).A SMS-Based Mobile Botnet Using Flooding Algorithm.WISTP
-
Karasaridis, A.,Rexroad, B.,Hoeflin, D.(2007).Wide-scale botnet detection and characterization.Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
Lee, Jae-Seo,Jeong, HyunCheol,Park, Jun-Hyung,Kim, Minsoo,Noh, Bong-Nam(2008).The Activity Analysis of Malicious HTTP-Based Botnets Using Degree of Periodic Repeatability.Proceedings of the International Conference on Security Technology,South Korea:
-
Liu, Lei,Chen, Songqing,Yan, Guanhua,Zhang, Zhao.,未出版
-
Lo, Jih-Hong,Tzeng, Wen-Guey(2010).ROC,NCTU.
-
Moore, D.,Shannon, C.,Brown, D. J.,Voelker, G. M,Savage, S.(2006).Inferring Internet Denial of Service Activity.Proceedings of the ACM Transactions on Computer Systems,NY, USA:
-
Provos, N.,Holz, T.(2007).Virtual honeypots: From botnet tracking to intrusion detection.Addison-Wesley.
-
Xiong, Huijun,Yao, Danfeng(Daphne),Han, Lu(2010).,未出版
-
Yen, Ting-Fang,Reiter, Michael K.(2008).Traffic aggregation for malware detection.Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment,Berlin, Heidelberg:
-
Zeidanloo, H.R.,Manaf, A.A.(2010).Botnet Detection by Monitoring Similar Communication Patterns.International Journal of Computer Science and Information Security,7(3)
-
Zhuge, J.,Holz, T.,Han, X.,Guo, J.,Zou, W.(2007).Peking University & University of Mannheim Technical ReportPeking University & University of Mannheim Technical Report,未出版
-
Zou, C. C.,Cunningham, R.(2006).Honeypot-aware advanced botnet construction and maintenance.Proceedings of the International Conference on Dependable Systems and Networks,Orlando, FL:
|