메뉴 건너뛰기




Volumn , Issue , 2006, Pages 195-202

Detecting botnets with tight command and control

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; FLOW CHARACTERISTICS; HONEYNETS; LOCAL COMPUTER;

EID: 41949115980     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2006.322100     Document Type: Conference Paper
Times cited : (140)

References (25)
  • 1
    • 46149109403 scopus 로고    scopus 로고
    • Three charged with Seattle hospital botnet attack
    • February 14
    • "Three charged with Seattle hospital botnet attack," The Register, February 14, 2006.
    • (2006) The Register
  • 2
    • 51949110531 scopus 로고    scopus 로고
    • Targeted Trojan Email Attacks
    • National Infrastructure Security Coordination Center, June 16
    • National Infrastructure Security Coordination Center, "Targeted Trojan Email Attacks," NISCC Briefing 08/2005, June 16, 2005.
    • (2005) NISCC Briefing 08/2005
  • 3
    • 46149108966 scopus 로고    scopus 로고
    • Hacker Arrested for Breaching DoD Systems with 'Botnets',
    • November 4
    • Rob Thormeyer, "Hacker Arrested for Breaching DoD Systems with 'Botnets'," Government Computer News, November 4, 2005.
    • (2005) Government Computer News
    • Thormeyer, R.1
  • 8
    • 46149108734 scopus 로고    scopus 로고
    • Botnet Hunters Search for 'Command and Control' Servers
    • June 17
    • R. Naraine, "Botnet Hunters Search for 'Command and Control' Servers," eWeek, June 17, 2005.
    • (2005) eWeek
    • Naraine, R.1
  • 14
    • 30344486245 scopus 로고    scopus 로고
    • CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth
    • October-December
    • D. Kotz and T. Henderson, "CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth," IEEE Pervasive Computing, Volume 4, Issue 4, October-December 2005.
    • (2005) IEEE Pervasive Computing , vol.4 , Issue.4
    • Kotz, D.1    Henderson, T.2
  • 16
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures
    • New York, NY
    • S. Sen, O. Spatscheck, and D. Wang, "Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures," Proc. 13th International Conf. on World Wide Web, New York, NY, 2004.
    • (2004) Proc. 13th International Conf. on World Wide Web
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 25
    • 84888402098 scopus 로고    scopus 로고
    • The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
    • July 7
    • E. Cooke, F. Jahanian, and D. McPherson, "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets," USENIX SRUTI Workshop, July 7, 2005.
    • (2005) USENIX SRUTI Workshop
    • Cooke, E.1    Jahanian, F.2    McPherson, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.