메뉴 건너뛰기




Volumn , Issue , 2008, Pages 318-323

IRC traffic analysis for botnet detection

Author keywords

[No Author keywords available]

Indexed keywords

COORDINATION REACTIONS; INTERNET;

EID: 55349090681     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2008.58     Document Type: Conference Paper
Times cited : (25)

References (19)
  • 2
    • 84882582017 scopus 로고    scopus 로고
    • P. Barford and V. Yegneswaran. An inside look at botnets. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, Special Workshop on Malware Detection, 27 of Advances in Information Security. Springer Verlag, 2007.
    • P. Barford and V. Yegneswaran. An inside look at botnets. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, Special Workshop on Malware Detection, volume 27 of Advances in Information Security. Springer Verlag, 2007.
  • 5
    • 84891429894 scopus 로고    scopus 로고
    • Modeling botnet propagation using time zones
    • The Internet Society
    • D. Dagon, C. Zou, and W. Lee. Modeling botnet propagation using time zones. In NDSS. The Internet Society, 2006.
    • (2006) NDSS
    • Dagon, D.1    Zou, C.2    Lee, W.3
  • 7
    • 42549129831 scopus 로고    scopus 로고
    • Protocol identification of encrypted network traffic
    • IEEE Computer Society
    • M. Gebski, A. Penev, and R. K. Wong. Protocol identification of encrypted network traffic. In Web Intelligence, pages 957-960. IEEE Computer Society, 2006.
    • (2006) Web Intelligence , pp. 957-960
    • Gebski, M.1    Penev, A.2    Wong, R.K.3
  • 8
    • 85093871360 scopus 로고    scopus 로고
    • J. Goebel and T. Holz. Rishi: identify bot contaminated hosts by ire nickname evaluation. In HotBots'07: Proceedings of the first conference on First WorkshoponHot Topics in Understanding Botnets, pages 8-8, Berkeley, CA, USA, 2007. USENIX Association
    • J. Goebel and T. Holz. Rishi: identify bot contaminated hosts by ire nickname evaluation. In HotBots'07: Proceedings of the first conference on First WorkshoponHot Topics in Understanding Botnets, pages 8-8, Berkeley, CA, USA, 2007. USENIX Association
  • 9
    • 34547969527 scopus 로고    scopus 로고
    • The new front line: Estonia under cyberassault
    • IEEE, July-Aug
    • M. Lesk. The new front line: Estonia under cyberassault. Security and Privacy, IEEE, 5(4):76-79, July-Aug. 2007.
    • (2007) Security and Privacy , vol.5 , Issue.4 , pp. 76-79
    • Lesk, M.1
  • 11
    • 2642516930 scopus 로고
    • Internet relay chat protocol
    • May
    • J. Oikarinen and D. Reed. Internet relay chat protocol. RFC, May 1993.
    • (1993) RFC
    • Oikarinen, J.1    Reed, D.2
  • 12
    • 24644463025 scopus 로고    scopus 로고
    • Bots and botnets: An overview
    • Technical report, SANS institute
    • R. Puri. Bots and botnets: An overview. Technical report, SANS institute, 2003.
    • (2003)
    • Puri, R.1
  • 13
    • 55349149918 scopus 로고    scopus 로고
    • J. R. Quinlan. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993.
    • J. R. Quinlan. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993.
  • 14
    • 34547399387 scopus 로고    scopus 로고
    • A multi-faceted approach to understanding the botnet phenomenon
    • J. M. Almeida, V. A. F. Almeida, and P. Barford, editors, ACM
    • M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multi-faceted approach to understanding the botnet phenomenon. In J. M. Almeida, V. A. F. Almeida, and P. Barford, editors, Internet Measurement Conference, pages 41-52. ACM, 2006.
    • (2006) Internet Measurement Conference , pp. 41-52
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 15
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. SIGCOMM Comput. Commun. Rev, 36(4):291-302, 2006.
    • (2006) SIGCOMM Comput. Commun. Rev , vol.36 , Issue.4 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2
  • 17
    • 33746642190 scopus 로고    scopus 로고
    • Worms and viruses and botnets, oh my!: Rational responses to emerging internet threats
    • G. P. Schaffer. Worms and viruses and botnets, oh my!: Rational responses to emerging internet threats. IEEE Security and Privacy, 4(3):52-58, 2006.
    • (2006) IEEE Security and Privacy , vol.4 , Issue.3 , pp. 52-58
    • Schaffer, G.P.1
  • 19
    • 84887252594 scopus 로고    scopus 로고
    • Support vector method for function approximation, regression estimation and signal processing
    • M. Mozer, M. I. Jordan, and T. Petsche, editors, MIT Press
    • V. Vapnik, S. E. Golowich, and A. J. Smola. Support vector method for function approximation, regression estimation and signal processing. In M. Mozer, M. I. Jordan, and T. Petsche, editors, NIPS, pages 281-287. MIT Press, 1996.
    • (1996) NIPS , pp. 281-287
    • Vapnik, V.1    Golowich, S.E.2    Smola, A.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.