메뉴 건너뛰기




Volumn , Issue , 2006, Pages 967-974

Using machine learning techniques to identify botnet traffic

Author keywords

[No Author keywords available]

Indexed keywords

A POSTERIORI; BAYESIAN NETWORK CLASSIFIER (BNC); BOTNETS; CLASSIFICATION ACCURACIES; CLASSIFICATION TECHNIQUES; COMMUNICATION FLOWS; CYBER ATTACKS; INTERNET RELAY CHAT (IRC); LOCAL COMPUTER; MACHINE LEARNING TECHNIQUES; MACHINE-LEARNING; MONITORING NETWORKS; NAIVE BAYES (NB); TRAINING DATA; TRAINING SETS; TWO STAGES;

EID: 46149123241     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2006.322210     Document Type: Conference Paper
Times cited : (287)

References (14)
  • 4
    • 20844452458 scopus 로고    scopus 로고
    • T. Holz. A Short Visit to the Bot Zoo. IEEE Security & Privacy, 3(3):76-79, May 2005.
    • T. Holz. A Short Visit to the Bot Zoo. IEEE Security & Privacy, 3(3):76-79, May 2005.
  • 5
    • 3042826619 scopus 로고    scopus 로고
    • The Making of a Spam Zombie Army
    • July
    • E. Levy. The Making of a Spam Zombie Army. IEEE Security & Privacy, 1(4):58-59, July 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.4 , pp. 58-59
    • Levy, E.1
  • 6
    • 46149108489 scopus 로고    scopus 로고
    • McAfee. 2006/3/6; DDoS-Kaiten http://vil.nai.com/vil/content/v_99371.htm.
    • (2006) 6; DDoS-Kaiten
    • McAfee1
  • 7
    • 23944454354 scopus 로고    scopus 로고
    • Automated Identity Theft
    • Sept
    • B. McCarty. Automated Identity Theft. IEEE Security & Privacy, 1(5):89-92, Sept. 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.5 , pp. 89-92
    • McCarty, B.1
  • 8
    • 3042784584 scopus 로고    scopus 로고
    • Botnets: Big and Bigger
    • July
    • B. McCarty. Botnets: Big and Bigger. IEEE Security & Privacy, 1(4):87-90, July 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.4 , pp. 87-90
    • McCarty, B.1
  • 13
    • 0012109964 scopus 로고    scopus 로고
    • The Honeynet Project, Addison-Wesley Professional; 2 edition May 17, Mar
    • The Honeynet Project. Know Your Enemy : learning about Security Threats. Addison-Wesley Professional; 2 edition (May 17, 2004), Mar. 2004.
    • (2004) Know Your Enemy : Learning about Security Threats


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.