[1]AMINI P,ARAGHIZADEH M A,AZMI R.A survey on Botnet:classification,detection and defense[C]//Proceedings of IEEE IES’15.Washington D.C,USA:IEEE Press,2015:233-238.br/
[2]ALOMARI E,MANICKMA S,GUPTA B B,et al.Botnet-based distributed denial of service attacks on Web servers:classification and art [J].International Journal of Computer Applications,2012,49(7):24-32.br/
[3]GU G.Correlation-based Botnet detection in enterprise networks[D].Atlanta,USA:Georgia Institute of Technology Atlanta,2008.br/
[4]杨小燕.P2P僵尸网络检测技术研究[D].长沙:湖南大学,2012.br/
[5]DITTRICH D,DIETRICH S.P2P as Botnet command and control:a deeper insight[C]//Proceedings of the 3rd International Conference on Malicious and Unwanted Software.Washington D.C.,USA:IEEE Press,2008:41-48.br/
[6]MASUD M M,AL-KHATEEB T,KHAN L,et al.Flow-based identification of Botnet traffic by mining multiple log files[C]//Proceedings of the 1st International Conference on Distributed Framework and Applications.Washington D.C.,USA:IEEE Press,2008:200-206.br/
[7]WANG P,WU L,CUNNINGHAM R,et al.Honeypot detection in advanced Botnet attacks[J].International Journal of Information and Computer Security,2010,4(1):30-51.br/
[8]FEILY M,SHAHRESTNI A,RAMADASS S.A survey of Botnet and Botnet detection[C]//Proceedings of the 3rd International Conference on Emerging Security Infor-mation,Systems and Technologies.Washington D.C.,USA:IEEE Press,2009:268-273.br/
[9]ZHAO D,TRAORE I,SAYED B,et al.Botnet detection based on traffic behavior analysis and flow intervals[J].Computers and Security,2013,39(1):2-16.br/
[10]LIVADAS C,WALSH R,LAPSLEY D,et al.Usilng machine learning technologies to identify Botnet traffic[C]//Proceedings of the 31st IEEE Conference on Local Computer Networks.Washington D.C.,USA:IEEE Press,2006:967-974.br/
[11]LIU L,CHEN S,YAN G,et al.BotTracer:execution-based bot-like malware detection[M].Berlin,Germany:Springer,2008:97-113.br/
[12]STINSON E,MITCHELL C J.Characterizing bots’ remote control behavior [J].Advances in Information Security,2007,36(1):45-79.br/
[13]GU G,ZHANG J,LEE W.BotSniffer:detecting Botnet command and control channels in network traffic[C]//Proceedings of the 10th Network and Distributed System Security Symposium.San Diego,USA:[s.n.],2008:215-222.br/
[14]THOMAS M,MOHAISEN A.Kindred domains:detecting and clustering Botnet domains using DNS traffic[C]//Proceedings of the 23rd International Conference on World Wide Web.New York,USA:ACM Press,2014:707-712.br/
[15]CHOI H,LEE H.Identifying Botnets by capturing group activities in DNS traffic[J].Computer Networks,2012,56(1):20-33.br/
[16]SOLTANI S,SENO S A H,NEZHADKAMALI M,et al.A survey on real world Botnets and detection mechanisms[J].International Journal of Information and Network Security,2014,3(2):116.br/
[17]STEVANOVIC M,PEDERSEN J M.An efficient flow-based Botnet detection using supervised machine learn-ing[C]//Proceedings of 2014 International Conference on Computing,Networking and Communications.Washington D.C.,USA:IEEE Press,2014:797-801.br/
[18]RANJAN S.Machine learning based botnet detection using real-time extracted traffic features:U.S.Patent 8,682,812[P].2014-03-25.br/
[19]HADDADI F,PHAN D T,ZINCIR-HEYWOOD A N.How to choose from different Botnet detection systems[C]//Proceedings of IEEE/IFIP Network Operations and Management Symposium.Washington D.C.,USA:IEEE Press,2016:1079-1084.br/
[20]YIN C,ZOU M,IKO D,et al.Botnet detection based on correlation of malicious behaviors[J].International Journal of Hybrid Information Technology,2013,6(6):291-300.br/
[21]文传军,汪庆淼,詹永照.隐隶属度模糊c均值聚类算法[J].计算机应用与软件,2015,32(12):245-248.br/
[22]SWETHA K V,SATHYADEVAN S,BILNA P.Network data analysis using spark[M].Berlin,Germany:Springer,2015:253-259.br/
[23]GARCIA S,GRILL M,STIBOREK J,et al.An empirical comparison of Botnet detection methods [J].Computers & Security,2014,45:100-123.br/ |