[1]康乐,李东,余翔湛.基于SVM的Fast-Flux僵尸网络检测技术研究[J].智能计算机与应用,2011,3(1):24-27.
[2]左晓军,董立勉,曲武.基于域名系统流量的Fast-Flux僵尸网络检测方法[J].计算机工程,2017,43(9):185-193.
[3]ALIEYAN K,ALMOMNI A,MANASRAH A,et al.A survey of botnet detection based on DNS[J].Neural Computing and Applications,2017,28(7):1541-1558.
[4]CAGLAYAN A,TOOTHAKER M,DRAPEAU D,et al.Behavioral analysis of botnets for threat intelligence[J].Information Systems and e-Business Management,2012,10(4):491-519.
[5]李青山,陈钟.Domain-flux僵尸网络域名检测[J].计算机工程与设计,2012,33(8):2915-2919.
[6]GU G,PERDISCI R,AHANG J,et al.Bot miner:clustering analysis of network traffic for protocol and structure in dependent Botnet detection[C]//Proceedings of the 17th IEEE Conference on Security Symposium.San Jose,USA:[s.n.],2008:139-154.
[7]WANG P,WU L,ASLAM B,et al.A systematic study on peer-to-peer Botnets[C]//Proceedings of International Conference on Computer Communications and Networks.[S.1.]:IEEE Computer Society,2009:1-8.
[8]PRASAD K M,REDDY A R M,KARTHIK M G.Flooding attacks to Internet threat monitors:modeling and counter measures using Botnet and honeypots[J].International Journal of Computer Science and Information Technology,2012,3(6):159-172.
[9]FUTA I,ZHANG S,et al.Hybrid detection and tracking of fast-flux Botnet on domain name system traffic[J].China Communications,2013,10(11):81-94.
[10]OTGONBOLD T.ADAPT:an anonymous,distributed,and active probing-based technique for detecting malicious fast-flux domains[EB/OL].[2017-06-12].https://search.proquest.com/docview/1659794561.
(下转第195页)
(上接第189页)
[11]KOO T M,CHANG H C,CHUANG C C.Detecting and analyzing fast-flux service networks[J].Advances in Information Sciences and Service Sciences,2012,4(10):183-190.
[12]KOO T M,CHANG H C,SU W H.Building a P2P Botnet based on a new key management scheme[J].Advances in Information Sciences and Service Sciences,2012,4(5):199-207.
[13]HOLE T,GORECKI C,RIECK K,et al.Measuring and detecting fast-flux service networks[C]//Proceedings of Network and Distributed System Security Symposium.San Diego,USA:[s.n.],2008:487-492.
[14]ALMOMANI A,GUPTA B B,ATAWNEH S,et al.A survey of phishing email filtering techniques[J].IEEE Communications Surveys and Tutorials,2013,15(4):2070-2090.
[15]KONTE M,FEAMSTER N,JUNG J.Dynamics of online scam hosting infrastructure[C]//Proceedings of International Conference on Passive and Active Network Measurement.Berlin,Germany:Springer,2009:219-228.
[16]HSU C H,HUANG C Y,CHEN K T.Fast-flux bot detection in real time[C]//Proceedings of International Conference on Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2010:464-483.
[17]PERDISCI R,CORONA I,DAGON D,et al.Detecting malicious flux service networks through passive analysis of recursive DNS traces[C]//Proceedings of Computer Security Applications Conference.[S.1.]:IEEE Computer Society,2009:311-320.
[18]ALDUWAIRI B N,ALHAMMOURI A T.Fast flux watch:a mechanism for online detection of fast flux networks[J].Journal of Advanced Research,2014,5(4):473-479.
[19]MARTINEZ-BEA S,CASTILLO-PEREZ S.Real-time malicious fast-flux detection using DNS and bot related features[C]//Proceedings of the 11th International Conference on Privacy,Security and Trust.Washington D.C.,USA:IEEE Press,2013:369-372.
[20]CAGLIYAN A,TOOTHAKER M,DAN D,et al.Real-time detection of fast flux service networks[C]//Proceedings of Cybersecurity Applications and Technology Conference on Homeland Security.[S.1.]:IEEE Computer Society,2009:285-292. |