메뉴 건너뛰기




Volumn , Issue , 2007, Pages 325-338

A taxonomy of botnet structures

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; COMPUTER SECURITY APPLICATIONS; P2P NETWORKS; PERFORMANCE METRICS; RANDOM GRAPHS; REMEDIATION STRATEGIES; SCALE-FREE; SCALE-FREE NETWORKS; STRUCTURAL SOLUTIONS;

EID: 48649089769     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2007.44     Document Type: Conference Paper
Times cited : (198)

References (64)
  • 3
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • A.-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286(509), 1999.
    • (1999) Science , vol.286 , Issue.509
    • Barabási, A.-L.1    Albert, R.2
  • 5
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • R. Albert, H. Jeong, and A.-L. Barabási. Error and attack tolerance of complex networks. Nature, 406:378-382, 2000.
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabási, A.-L.3
  • 9
    • 1642434224 scopus 로고    scopus 로고
    • Using sensor networks and data fusion for early detection of active worms
    • V. Berk, R. Gray, and G. Bakos. Using sensor networks and data fusion for early detection of active worms. In Proceedings of the SPIE AeroSense, 2003.
    • (2003) Proceedings of the SPIE AeroSense
    • Berk, V.1    Gray, R.2    Bakos, G.3
  • 14
    • 84883150360 scopus 로고    scopus 로고
    • is the infection, 2005
    • D. Dagon. The network is the infection. http://www.caida.org/projects/ oarc/200507/slides/oarc0507-D\agon.pdf, 2005.
    • The network
    • Dagon, D.1
  • 15
    • 48649097305 scopus 로고    scopus 로고
    • Worm population control through periodic response
    • Technical report, Georgia Institute of Technology, June
    • D. Dagon, A. Takar, G. Gu, X. Qin, and W. Lee. Worm population control through periodic response. Technical report, Georgia Institute of Technology, June 2004.
    • (2004)
    • Dagon, D.1    Takar, A.2    Gu, G.3    Qin, X.4    Lee, W.5
  • 17
    • 33845592623 scopus 로고    scopus 로고
    • Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
    • Technical Report ISSN-0935-3232, RWTH Aachen, April
    • F. C. Freiling, T. Holz, and G. Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks. Technical Report ISSN-0935-3232, RWTH Aachen, April 2005.
    • (2005)
    • Freiling, F.C.1    Holz, T.2    Wicherski, G.3
  • 22
    • 38149054453 scopus 로고    scopus 로고
    • Using snort to detect rogue IRC bot programs
    • Technical report, October
    • C. Hanna. Using snort to detect rogue IRC bot programs. Technical report, October 2004.
    • (2004)
    • Hanna, C.1
  • 23
    • 41349120887 scopus 로고    scopus 로고
    • Attack vulnerability of complex networks
    • E65056109
    • P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han. Attack vulnerability of complex networks. Phys. Rev., E65(056109), 2002.
    • (2002) Phys. Rev
    • Holme, P.1    Kim, B.J.2    Yoon, C.N.3    Han, S.K.4
  • 24
    • 48649105414 scopus 로고    scopus 로고
    • at home in the united states: Growing but slowing, 2005
    • J. Horrigan. Broadband adoption at home in the united states: Growing but slowing. http://web.si.umich.edu/tprc/papers/2005/501/TPRC\%20Horrigan\ %20Broadband.2005b.pdf, 2005.
    • Broadband adoption
    • Horrigan, J.1
  • 32
    • 48649095253 scopus 로고    scopus 로고
    • LURHQ
    • LURHQ. Zindos worm analysis. http://www.lurhq.com/zindos.html, 2004.
    • (2004) Zindos worm analysis
  • 34
    • 48649086255 scopus 로고    scopus 로고
    • MaxMind LLC. Maxmind - ip geolocation and online fraud prevention. http://www.maxmind.com/, 2007.
    • MaxMind LLC. Maxmind - ip geolocation and online fraud prevention. http://www.maxmind.com/, 2007.
  • 35
    • 47949132450 scopus 로고    scopus 로고
    • Taxonomy of botnet threats. Technical report, Trend Micro White Paper
    • November
    • T. Micro. Taxonomy of botnet threats. Technical report, Trend Micro White Paper, November 2006.
    • (2006)
    • Micro, T.1
  • 36
    • 0002687371 scopus 로고
    • The small world problem
    • S. Milgram. The small world problem. Psychology Today, 2(60), 1967.
    • (1967) Psychology Today , vol.2 , Issue.60
    • Milgram, S.1
  • 40
    • 48649088885 scopus 로고    scopus 로고
    • The topology of covert conflict
    • Technical Report UCAM-CL-TR-637, University of Cambridge, July
    • S. Nagarja and R. Anderson. The topology of covert conflict. Technical Report UCAM-CL-TR-637, University of Cambridge, July 2005.
    • (2005)
    • Nagarja, S.1    Anderson, R.2
  • 41
    • 48649084321 scopus 로고    scopus 로고
    • Botnet tracking: Tools, techniques, and lessons learned
    • J. Nazario. Botnet tracking: Tools, techniques, and lessons learned. In Black Hat, 2007.
    • (2007) Black Hat
    • Nazario, J.1
  • 42
    • 0035420732 scopus 로고    scopus 로고
    • Random graphs with arbitrary degree distributions and their applications
    • E64026118
    • M. Newman, S. Strogatz, and D. Watts. Random graphs with arbitrary degree distributions and their applications. Phys. Rev., E64(026118), 2001.
    • (2001) Phys. Rev
    • Newman, M.1    Strogatz, S.2    Watts, D.3
  • 43
    • 48649093954 scopus 로고    scopus 로고
    • Nielsen NetRatings. Average web usage. http://www.nielsen-netratings.com/ reports.jsp?section=pub_reports&report=usage&period=weekly, 2007.
    • (2007) Nielsen NetRatings. Average web usage
  • 49
    • 0036187056 scopus 로고    scopus 로고
    • Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design
    • M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 6(1), 2002.
    • (2002) IEEE Internet Computing Journal , vol.6 , Issue.1
    • Ripeanu, M.1    Foster, I.2    Iamnitchi, A.3
  • 53
    • 44649101679 scopus 로고    scopus 로고
    • Attack of the 50 foot botnet
    • Technical report, Department of Computer Science, University of Calgary, August
    • R. Vogt and J. Aycock. Attack of the 50 foot botnet. Technical report, Department of Computer Science, University of Calgary, August 2006.
    • (2006)
    • Vogt, R.1    Aycock, J.2
  • 61
    • 8644236108 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on ip address information
    • Technical Report TR-03-CSE-06, Umass ECE Dept, November
    • C. Zou, D. Towsley, W. Gong, and S. Cai. Routing worm: A fast, selective attack worm based on ip address information. Technical Report TR-03-CSE-06, Umass ECE Dept., November 2003.
    • (2003)
    • Zou, C.1    Towsley, D.2    Gong, W.3    Cai, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.