[1] 杜跃进, 崔 翔. 僵尸网络及其启发[J]. 中国数据通信, 2005, 7(5): 9-13.
[2] Freiling F, Holz T, Wicherski G. Botnet Tracking: Exploring a Root-cause Methodology to Prevent Distributed Denial-of-service Attacks[C]//Proc. of the 10th European Symposium on Research in Computer Security. Berlin, Germany: Springer, 2005.
[3] Dagon D, Zou C, Lee W. Modeling Botnet Propagation Using Time Zones[C]//Proc. of NDSS’06. Berkeley, USA: [s. n.], 2006.
[4] Ramachandran A, Feamster N, Dagon D. Revealing Botnet Mem- bership Using DNSBL Counter-intelligence[C]//Proc. of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet. Berkeley, USA: [s. n.], 2006.
[5] Porras P A, Saidi H, Yegneswaran V. An Analysis of the Ikee.B (Duh) iPhone[C]//Proc. of ICST’10. Berlin, Germany: Springer, 2010.
[6] Schmidt A D, Schmidt H G, Batyuk L, et al. Smartphone Malware Evolution Revisited: Android Next Target?[C]//Proc. of the 4th IEEE International Conference on Malicious and Unwanted Software. [S. l.]: IEEE Computer Society, 2009.
[7] Wang P, Sparks S, Zou C C. An Advanced Hybrid Peer-to-Peer Botnet[C]//Proc. of the 1st Conference on First Workshop on Hot Topics in Understanding Botnets. Berkeley, USA: [s. n.], 2007.
[8] 谢 静, 谭 良. 一种高鲁棒性的新型P2P僵尸网络[J]. 计算机工程, 2011, 37(7): 154-156.
[9] Zeng Yuanyuan, Hu Xin, Shin K G. Design of SMS Commanded and Controlled and P2P-structured Mobile Botnets[EB/OL]. [2011-03-20]. https://www.eecs.umich.edu/techreports/cse/2010/ CSE-TR-562-10.pdf.
[10] Singh K, Sangal S, Jain N, et al. Evaluating Bluetooth as a Me- dium for Botnet Command and Control[C]//Proc. of DIMVA’10. Berlin, Germany: Springer, 2010.
[11] 北京网秦天下科技有限公司. 2010年中国大陆地区手机安全报告[EB/OL]. [2011-03-20]. http://www.netqin.com/upLoad/File/bao gao/2010anquanbaodao(1).pdf.
[12] Ollmann G. Botnet Communication Topologies[EB/OL]. [2011-03-20]. http://www.damballa.com/solutions/downloads.com.
[13] Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems[J]. Communi- cations of the ACM, 1978, 21(2): 120-126. |