参考文献
|
-
Zeus Botnet http://www.networkworld.com/news/2010/092910-zeus-botnet-sms-banks.html
-
Bredolab Botnet http://www.huffingtonpost.com/2012/05/24/georgy-avanesov-found-guilty_n_1543687.html
-
MS08067 http://technet.microsoft.com/zh-tw/security/bulletin/ms08-067
-
Antonakakis, M.,Perdisci, R.,Dagon, D.,Lee, W.,Feamster, N.(2010).Building a Dynamic Reputation System for DNS.Proc. of the 19th USENIX Conference on Security (SEC'10)
-
Antonakakis, M.,Perdisci, R.,Lee, W.(2011).Detecting Malware Domains at the Upper DNS Hierarchy.Proc. of the 20th USENIX Conference on Security (SEC'11)
-
Bilge, L.,Kirda, E.,Kruegel, C.,Balduzzi, M.(2011).Exposure: Finding malicious domains using passive dns analysis.Proc. of the 18th Annual Network and Distributed System Security Symposium (NDSS'11)
-
Caglayan, A.,Toothaker, M.,Drapeau, D.,Burke, D.,Eaton, G.(2009).Real-Time Detection of Fast-Flux Service Networks.Proc. of the 2009 Cybersecurity Applications and Technology Conference for Homeland Security (CATCH'09)
-
Chang, S.,Daniels, T. E.(2009).P2P Botnet Detection using Behavior Clustering & Statistical Tests.Proc. of the 2nd ACM Workshop on Security and ArtificialIintelligence (AISec '09)
-
Choi, H.,Lee, H.,Kim, H.(2009).BotGAD - Detecting Botnets by Capturing Group Activities in Network Traffic.Proc. of the Fourth International ICST Conference on Communication System Software and Middleware (COMSWARE '09)
-
Gu, G.,Perdisci, R.,Zhang, J.,Lee, W.(2008).BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.Proc. of the 17th USENIX Conference on Security (SEC'08)
-
Gu, G.,Porras, P.,Yegneswaran, V.,Fong, M.,Lee. W.(2007).BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.Proc. of the 16th USENIX Conference on Security (SEC'07)
-
Gu, G.,Zhang, J.,Lee, W.(2008).BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS '08)
-
Holz, T.,Gorecki, C.,Rieck, K.,Freiling, F. C.(2008).Measuring and Detecting Fast-Flux Service Networks.Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS '08)
-
Hsu, C.-H.,Huang, C.-Y.,Chen, K.-T.(2010).Fast-flux bot detection in real time.Proc. of the 13th International Conference on Recent Advances in Intrusion Detection (RAID'10)
-
Huang, S.-Y.,Mao, C.-H.,Lee, H.-M.(2010).Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection.Proc. of the 5th ACM Symposium on Information, Computer and Communications Security (AsiaCCS'10)
-
Jackson, A. W.,Lapsley, D.,Jones, C.,Zatko, M.,Golubitsky, C.,Strayer, W. T.(2009).SLINGbot: A System for Live Investigation of Next Generation Botnets.Proc. of the 2009 Cybersecurity Applications and Technology Conference for Homeland Security (CATCH '09)
-
Li, Chao,Jiang, Wei,Zou, Xin(2009).Botnet: Survey and Case Study.Proc. of the 4th International Conference on Innovative Computing, Information and Control (ICICIC'09)
-
Liu, L.,Chen, S.,Yan, G.,Zhang, Z.(2008).BotTracer: Execution-based Bot-like Malware Detection.Proc. of the 11th international conference on Information Security (ISC '08)
-
McGrath, D. K.,Kalafut, A. J.,Gupta, M.(2009).Phishing infrastructure fluxes all the way.IEEE Security and Privacy,7(5),21-28.
-
Nagaraja, S.,Mittal, P.,Hong, C.,Caesar, M.,Borisov, N.(2010).BotGrep: Finding P2P Bots with Structured Graph Analysis.Proc. of the 19th USENIX Conference on Security (SEC'10)
-
National Computer Emergency Response technical Team/Coordination Centre of China=CNCERT/CC(2008).Guide on Policy and Technical Approaches against Botnet.Proc. of the 37th APEC Telecommunications and Information Working Group
-
Passerini, E.,Paleari, R.,Martignoni, L.,Bruschi, D.(2008).Fluxor: Detecting and monitoring fast-flux service networks.Proc. of the 5thIinternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'08)
-
Perdisci, R.,Corona, I.,Dagon, D.,Lee, W.(2009).Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.Annual Computer Security Applications Conference
-
Rajab, M. A.,Zarfoss, J.,Monrose, F.,Terzis, A.(2006).A multifaceted approach to understanding the botnet phenomenon.Proc. of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06)
-
Stone-Gross, B.,Cova, M.,Cavallaro, L.,Gilbert, B.,Szydlowski, M.,Kemmerer, R.,Kruegel, C.,Vigna, G.(2009).Your Botnet is My Botnet: Analysis of a Botnet Takeover.Proc. of the 16th ACM Conference on Computer and Communications Security (CCS '09)
-
Strayer, W. T.,Lapsely, D.,Walsh, R.,Livadas, C.(2008).Botnet Detection Based on Network Behavior.Advances in Information Security,36,1-24.
-
The Honeynet Project(2007).,未出版
-
Villamarín-Salomón, R.,Brustoloni, J. C.(2009).Bayesian bot detection based on DNS traffic similarity.Proc. of the 2009 ACM Symposium on Applied Computing (SAC'09)
-
Xie, Y.,Yu, F.,Achan, K.,Panigrahy, R.,Hulten, G.,Osipkov, I.(2008).Spamming Botnets: Signatures and Characteristics.Proc. of the ACM SIGCOMM 2008 Conference on Data Communication (SIGCOMM '08)
-
Yu, F.,Xie, Y.,Ke, Q.(2010).SBotMiner: Large Scale Search Bot Detection.Proc. of the third ACM International Conference on Web Search and Data Mmining (WSDM '10)
|