메뉴 건너뛰기




Volumn 19, Issue 3, 2008, Pages 702-715

Research and development of botnets

Author keywords

Bot; Botnet; Malware; Network security; Propagation model

Indexed keywords

COMPUTER CRIME; COMPUTER VIRUSES; COMPUTER WORMS; INTERNET; SECURITY OF DATA;

EID: 41949123110     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1001.2008.00702     Document Type: Article
Times cited : (52)

References (44)
  • 1
    • 17844404852 scopus 로고    scopus 로고
    • Malicious bots threaten network security
    • Geer D. Malicious bots threaten network security. IEEE Computer, 2005, 38(1): 18-20.
    • (2005) IEEE Computer , vol.38 , Issue.1 , pp. 18-20
    • Geer, D.1
  • 3
    • 80052676245 scopus 로고    scopus 로고
    • Symantec Internet security threat report: Trends for January 06-June 06. Volume X
    • Symantec Inc.
    • Symantec Inc. Symantec Internet security threat report: Trends for January 06-June 06. Volume X. 2006. http://eval.symantec.com/
    • (2006)
  • 4
    • 51249108585 scopus 로고    scopus 로고
    • Symantec Internet security threat report: Trends for July 06-December 06. Volume XI
    • Symantec Inc.
    • Symantec Inc. Symantec Internet security threat report: Trends for July 06-December 06. Volume XI. 2007. http://eval.symantec.com/
    • (2007)
  • 7
    • 39749199168 scopus 로고    scopus 로고
    • HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle
    • Chinese source
    • Zhuge JW, Han XH, Zhou YL, Song CY, Guo JP, Zou W. HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle. Journal on Communications, 2007, 28(12): 8-13 (in Chinese with English abstract).
    • (2007) Journal on Communications , vol.28 , Issue.12 , pp. 8-13
    • Zhuge, J.W.1    Han, X.H.2    Zhou, Y.L.3    Song, C.Y.4    Guo, J.P.5    Zou, W.6
  • 9
    • 41949100618 scopus 로고    scopus 로고
    • Overview of botnet
    • Chinese source
    • Sun YD, Li D. Overview of botnet. Computer Applications, 2006, 26(7): 1628-1630 (in Chinese with English abstract).
    • (2006) Computer Applications , vol.26 , Issue.7 , pp. 1628-1630
    • Sun, Y.D.1    Li, D.2
  • 10
    • 24644463025 scopus 로고    scopus 로고
    • Bots and botnet: An overview
    • Puri R. Bots and botnet: An overview. SANS White Paper. 2003. http://www.sans.org/reading_room/whitepapers/malicious/1299.php
    • (2003) SANS White Paper
    • Puri, R.1
  • 11
    • 3042784584 scopus 로고    scopus 로고
    • Botnets: Big and bigger
    • McCarty B. Botnets: Big and bigger. IEEE Security and Privacy, 2003, 1(4): 87-90.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 87-90
    • McCarty, B.1
  • 12
    • 26844548971 scopus 로고    scopus 로고
    • Know your enemy: Tracking botnets
    • Bacher P, Holz T, Kotter M, Wicherski G. Know your enemy: Tracking botnets. 2005. http://www.honeynet.org/papers/bots
    • (2005)
    • Bacher, P.1    Holz, T.2    Kotter, M.3    Wicherski, G.4
  • 13
    • 34547399387 scopus 로고    scopus 로고
    • A multifaceted approach to understanding the botnet phenomenon
    • Almeida J.M., Almeida V.A.F. and Barford P. (ed.), Rio de Janeriro: ACM Press
    • Rajab MA, Zarfoss J, Monrose F, Terzis A. A multifaceted approach to understanding the botnet phenomenon. In: Almeida JM, Almeida VAF, Barford P, eds. Proc. of the 6th ACM Internet Measurement Conf. (IMC 2006). Rio de Janeriro: ACM Press, 2006. 41-52.
    • (2006) Proc. of the 6th ACM Internet Measurement Conf. (IMC 2006) , pp. 41-52
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 14
    • 3042742908 scopus 로고    scopus 로고
    • An analysis of the slapper worm
    • Arce I, Levy E. An analysis of the slapper worm. IEEE Security and Privacy, 2003, 1(1): 82-87.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.1 , pp. 82-87
    • Arce, I.1    Levy, E.2
  • 15
    • 84882582017 scopus 로고    scopus 로고
    • An inside look at botnets
    • Christodorescu M., Jha S., Maughan D., Song D. and Wang C. (ed.), Springer-Verlag
    • Barford P, Yegneswaran V. An inside look at botnets. In: Christodorescu M, Jha S, Maughan D, Song D, Wang C, eds. Advances in Information Security, Malware Detection, Vol.27. Springer-Verlag, 2007. http://www.springerlink.com/content/w4576m 3186524245/
    • (2007) Advances in Information Security, Malware Detection, Vol.27
    • Barford, P.1    Yegneswaran, V.2
  • 16
    • 20844452458 scopus 로고    scopus 로고
    • A short visit to the bot zoo
    • Holz T. A short visit to the bot zoo. IEEE Security and Privacy, 2005, 3(3): 76-79.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 76-79
    • Holz, T.1
  • 17
    • 58149121721 scopus 로고    scopus 로고
    • The evolution of malicious IRC bots
    • Canavan J. The evolution of malicious IRC bots. In: Proc. of the 2005 Virus Bulletin Conf. (VB 2005). 2005. http://www.symantec.com/avcenter/reference/ the.evolution.of.malicious.irc.bots.pdf
    • (2005) Proc. of the 2005 Virus Bulletin Conf. (VB 2005)
    • Canavan, J.1
  • 18
    • 8644261522 scopus 로고    scopus 로고
    • Research and development of Internet worms
    • Chinese source
    • Wen WP, Qing SH, Jiang JC, Wang YJ. Research and development of Internet worms. Journal of Software, 2004, 15(8): 1208-1219 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/1208.htm
    • (2004) Journal of Software , vol.15 , Issue.8 , pp. 1208-1219
    • Wen, W.P.1    Qing, S.H.2    Jiang, J.C.3    Wang, Y.J.4
  • 21
    • 48649106122 scopus 로고    scopus 로고
    • RFC 2810: Internet relay chat: Architecture
    • RFC 2810, IETF
    • Kalt C. RFC 2810: Internet relay chat: Architecture. RFC 2810, IETF, 2000.
    • (2000)
    • Kalt, C.1
  • 28
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • Staniford S. (ed.), New York: ACM Press
    • Zou CC, Gong W, Towsley D. Worm propagation modeling and analysis under dynamic quarantine defense. In: Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). New York: ACM Press, 2003. 51-60.
    • (2003) Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003) , pp. 51-60
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 37
  • 43
    • 34547415753 scopus 로고    scopus 로고
    • Bots and botnets: Risks, issues and prevention
    • Overton M. Bots and botnets: Risks, issues and prevention. In: Proc. of the 2005 Virus Bulletin Conf. 2005. http://momusings.com/papers/VB2005-Bots_and_Botnets-1.0.2.pdf
    • (2005) Proc. of the 2005 Virus Bulletin Conf.
    • Overton, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.