参考文献
[ 1 ] Bacher P,Holz T,Kotter M,et al. Know Your Enemy: Tracking Botnets[J / OL]. [2013-09-15]. http:/ / www.
honeynet. org / papers / bots.
[ 2 ] Goebel J. Rishi:Identify Bot Contaminated Hosts by IRC
Nickname Evaluation[C] / / Proceedings of HotBots’07.
Berkeley,USA:USENIX,2007:47-56.
[ 3 ] Gu Guofei,Porras P,Yegneswaran V,et al. Bothunter: Detecting Malware Infection Through IDS-driven Dialog
Correlation[C] / / Proceedings of Security’07. [S. l. ]: USENIX,2007:167-182.
[ 4 ] Gu Guofei,Zhang Junjie,Lee W. BotSniffer:Detecting
Botnet Command and Control Channels in Network
Traffic[ C ] / / Proceedings of NDSS ’ 08. San Diego, USA:[s. n. ],2008:234-251.
[ 5 ] Gu Guofei, Perdisci R, Zhang Junjie, et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and
Structure Independent Botnet Detection [C]/ / Proceedings
of USENIX Security’08. [S. l. ]:USENIX,2008:139-154.
[ 6 ] 刘建波. 基于流量分析的P2P 僵尸网络检测[J]. 计算
机与数字工程,2011,39(3):90-91.
[ 7 ] 刘 丹,李毅超,胡 跃. 多阶段过滤的P2P 僵尸网络
检测方法[J]. 计算机应用,2010,30(12):3355-3356.
[ 8 ] 王海龙,胡 宁. Bot_CODA:僵尸网络协同检测体系
结构[J]. 通信学报,2009,30(10A):15-22.
[ 9 ] 李润恒,王明华. 基于通信特征提取和IP 聚集的僵尸
网络相似性度量模型[J]. 计算机学报,2010,33(1):
45-54.
[10] Collins M,Shimeall T,Faber S,et al. Using Uncleanliness
to Predict Future Botnet Addresses [C]/ / Proceedings of
ACM/ USENIX Internet Measurement Conference. [S. l. ]: ACM Press,2007:91-102.
[11] Ramachandran A, Feamster N. Understanding the
Network-level Behavior of Spammers[C] / / Proceedings
of ACM SIGCOMM’ 06. [S. l. ]:ACM Press,2006:
291-302.
[12] Zhuge J,Holz T,Han Xinhui,et al. Characterizing the
IRC-based Botnet Phenomenon[R]. Peking University &
University of Mannheim, Technical Report: TR-2007-
010,2007.
[13] 冯宗彬,时 剑,黄国庆,等. 一种新的P2P 僵尸网络
综合防御系统框架[J]. 军事通信技术,2010,31(l):
66-71.
[14] 谢文彪. 基于Agellt 协作机制的分布式入侵检测组织
结构研究[D]. 长沙:中南大学,2006.
编辑 金胡考 |