参考文献
[1]Bacher P,Holz T,Kotter M,et al.Know Your Enemy:Tracking Botnets[EB/OL].(2005-03-14).http://www.honeynet.org/papers/bots.
[2]诸葛建伟,韩心慧,周勇林,等.僵尸网络研究[J].软件学报,2008,19(3):702-715.
[3]Gu Guofei,Porras P,Yegneswaran V,et al.BotHunter:Detecting Malware Infection Through IDS-driven Dialog Correlation[C]//Proceedings of the 16th Usenix Security Symposium.Berlin,Germany:Springer,2007:167-182.
[4]Goebel J,Holz T.Rishi:Identify Bot Contaminated Hosts by IRC Nickname Evaluation[C]//Proceedings of the 1st Conference on Hot Topics in Understanding Botnets.Berlin,Germany:Springer,2007:1-8.
[5]Binkley J R,Singh S.An Algorithm for Anomaly-based Botnet Detection[C]//Proceedings of USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop.Berlin,Germany:Springer,2006:43-48.
[6]Wurzinger P,Bilge L,Holz T,et al.Automatically Generating Models for Botnet Detection[C]//Proceedings of the 14th European Symposium on Research in Computer Security.Saint-Malo,France:[s.n.],2009:232-249.
[7]Perdisci R,Lee W,Feamster N.Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces[C]//Proceedings of Con-ference on Networked System Design and Implement-
ation.Berlin,Germany:Springer,2010:391-404.
[8]Giroire F,Chandrashekar J,Taft N,et al.Exploiting Tem-poral Persistence to Detect Covert Botnet Channels[C]//Proceedings of the 12th International Symposium on Book Subtitle.Saint-Malo,France:[s.n.],2009:326-345.
[9]Gu Guofei,Zhang Junjie,Lee W.BotSniffer:Detecting Botnet Command and Control Channels in Network Traffic[C]//Proceedings of the 16th Annual Network&Distributed System Security Symposium.Berlin,Ger-many:Springer,2008:1-18.
[10]Gu Guofei,Perdisci R,Zhang Junjie,et al.BotMiner:Clustering Analysis of Network Traffic for Protocol-and Structure-independent Botnet Detection[C]//Pro-ceedings of USENIX Security Symposium.[S.l.]:Academic Search
Press,2008:139-154.
[11]Yen Tingfang,Reiter M K.Traffic Aggregation for Malware Detection[M]//Holz T,Bos H.Detection of Intrusions and Malware,and Vulnerability Assessment.Berlin,Germany:Springer,2008:207-227.
[12]Strayer W T,Walsh R,Livadas C,et al.Detecting Botnets with Tight Command and Control[C]//Proceedings of the 31st IEEE Conference on Local Computer Networks.Washington D.C.,USA:IEEE Press,2006:195-202.
[13]Nagaraja S,Mittal P,Hong Chi-Yao,et al.BotGrep:Finding P2P Bots with Structured Graph Analysis[C]//Proceedings of USENIX Security Symposium.[S.l.]:Academic Search Press,2010:95-110.
[14]Franois J,Wang Shaonan,Engel T.BotTrack:Tracking Botnets Using NetFlow and PageRank[C]//Proceedings of the 10th International IFIP TC 6 Networking Conference.Berlin,Germany:Springer,2011:1-14.
[15]Tegeler F,Fu Xiaoming,Vigna G,et al.Botfinder:Finding Bots in Network Traffic Without Deep Packet Inspection[C]//Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies.New York,USA:ACM
Press,2012:349-360.
[16]Coskun B,Dietrich S,Memon N.Friends of an Enemy:Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts[C]//Proceedings of the 26th Annual Computer Security Applications Conference.New York,USA:ACM Press,2010:131
-140.
[17]Kheir N,Wolley C.BotSuer:Suing Stealthy P2P Bots in Network Traffic Through Netflow Analysis[C]//Proceedings of the 12th International Conference on Cryptology and Network Security.Berlin,Germany:Springer,2013:162-178.
[18]Fan Yuhui,Xu Ning.A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection[J].International Journal of Security and Its Applications,2014,8(3).
[19]Amini P,Azmi R,Araghizadeh M A.Botnet Detection using NetFlow and Clustering[J].International Journal on Advances in Computer Science,2014,3(2):139-149.
[20]Garg S,Sarje A K,Peddoju S K.Improved Detection of P2P Botnets Through Network Behavior Analysis[C]//Proceedings of the 2nd International Conference on Security in Computer Networks and Distributed
Systems.Berlin,Germany:Springer,2014:334-345.
[21]Vania J,Meniya A,Jethva H B.A Review on Botnet and Detection Technique[J].International Journal of Computer Trends and Technology,2013,4(1):23-29.
[22]Wang Xiaogang,Qiu Weiliang,Zamar R H.CLUES:A Non-parametric Clustering Method Based on Local Shrinking[J].Computational Statistics&Data Analysis,2007,52(1):286-298.
编辑顾逸斐 |