메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 461-480

Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?

Author keywords

[No Author keywords available]

Indexed keywords

BOTNET; COMMAND AND CONTROL SYSTEMS; COMPLEX NETWORKS; DISINFECTION; FAULT TOLERANT COMPUTER SYSTEMS; GRAPH THEORY; NETWORK PROTOCOLS; OVERLAY NETWORKS; RHENIUM COMPOUNDS; SECURITY OF DATA; SECURITY SYSTEMS; STORMS;

EID: 57149103344     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_30     Document Type: Conference Paper
Times cited : (27)

References (38)
  • 1
    • 57149092985 scopus 로고    scopus 로고
    • Expert: Botnets no. 1 emerging Internet threat
    • January
    • CNN Technology News: Expert: Botnets no. 1 emerging Internet threat (January 2006), www.cnn.com/2006/TECH/internet/01/31/furst/
    • (2006) CNN Technology News
  • 2
    • 57149111249 scopus 로고    scopus 로고
    • Washington Post Technology news: The botnet trackers (February 2006), www.washingtonpost.com/wp-dyn/content/article/2006/02/16/ AR2006021601388.html
    • Washington Post Technology news: The botnet trackers (February 2006), www.washingtonpost.com/wp-dyn/content/article/2006/02/16/ AR2006021601388.html
  • 3
    • 57149116314 scopus 로고    scopus 로고
    • New York Times Technology news: Attack of the zombie computers is growing threat (January 2007), www.nytimes.com/2007/01/07/technology/07net.html
    • New York Times Technology news: Attack of the zombie computers is growing threat (January 2007), www.nytimes.com/2007/01/07/technology/07net.html
  • 6
    • 57149105080 scopus 로고    scopus 로고
    • Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: Proc. Conference on Applications, technologies, architectures, and protocols for computer communications (October 2006)
    • Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: Proc. Conference on Applications, technologies, architectures, and protocols for computer communications (October 2006)
  • 8
    • 57149107955 scopus 로고    scopus 로고
    • Bureau, P.M., Lee, A.: Malware storms: a global climate change. Virus Bulletin (November 2007), http://www.virusbtn.com
    • Bureau, P.M., Lee, A.: Malware storms: a global climate change. Virus Bulletin (November 2007), http://www.virusbtn.com
  • 9
    • 57149113315 scopus 로고    scopus 로고
    • Oikarinen, J., Reed, D.: Internet relay chat protocol. Request for Comments (RFC 1459) (May 1993)
    • Oikarinen, J., Reed, D.: Internet relay chat protocol. Request for Comments (RFC 1459) (May 1993)
  • 10
    • 84888402098 scopus 로고    scopus 로고
    • Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: Understanding, detecting, and disrupting botnets. In: Proc. 1st Conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (July 2005)
    • Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: Understanding, detecting, and disrupting botnets. In: Proc. 1st Conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (July 2005)
  • 12
    • 85080378133 scopus 로고    scopus 로고
    • Binkley, J.R., Singh, S.: An algorithm for anomaly-based botnet detection. In: Proc. 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (July 2006)
    • Binkley, J.R., Singh, S.: An algorithm for anomaly-based botnet detection. In: Proc. 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (July 2006)
  • 13
    • 41949115980 scopus 로고    scopus 로고
    • Strayer, W.T., Walsh, R., Livadas, C., Lapsley, D.: Detecting botnets with tight command and control. In: Proc. 31st IEEE Conference on Local Computer Networks (November 2006)
    • Strayer, W.T., Walsh, R., Livadas, C., Lapsley, D.: Detecting botnets with tight command and control. In: Proc. 31st IEEE Conference on Local Computer Networks (November 2006)
  • 14
    • 34547399387 scopus 로고    scopus 로고
    • Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proc. 6th ACM SIGCOMM Conference on Internet measurement (October 2006)
    • Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proc. 6th ACM SIGCOMM Conference on Internet measurement (October 2006)
  • 15
    • 57149084435 scopus 로고    scopus 로고
    • Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting botnet command and control channels in network traffic. In: Proc. 15th Annual Network and Distributed System Security Symposium (NDSS) (February 2008)
    • Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting botnet command and control channels in network traffic. In: Proc. 15th Annual Network and Distributed System Security Symposium (NDSS) (February 2008)
  • 20
    • 57149113692 scopus 로고    scopus 로고
    • Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Revised Papers from the 1st International Workshop on Peer-to-Peer Systems (IPTPS) (March 2002)
    • Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Revised Papers from the 1st International Workshop on Peer-to-Peer Systems (IPTPS) (March 2002)
  • 21
  • 25
    • 0001540595 scopus 로고
    • On random graphs I
    • Erdös, P., Rényi, A.: On random graphs I. Publ. Math. 15, 290-297 (1959)
    • (1959) Publ. Math , vol.15 , pp. 290-297
    • Erdös, P.1    Rényi, A.2
  • 26
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • Barabási, A.L., Albert, R.: Emergence of scaling in random networks. Science 286, 509-512 (1999)
    • (1999) Science , vol.286 , pp. 509-512
    • Barabási, A.L.1    Albert, R.2
  • 27
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of 'small-world' networks
    • Watts, D.J., Strogatz, S.H.: Collective dynamics of 'small-world' networks. Nature 393, 440-442 (1998)
    • (1998) Nature , vol.393 , pp. 440-442
    • Watts, D.J.1    Strogatz, S.H.2
  • 28
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Albert, R., Jeong, H., Barabási, A.L.: Error and attack tolerance of complex networks. Nature 406, 378-382 (2000)
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabási, A.L.3
  • 31
    • 57149115513 scopus 로고    scopus 로고
    • Stoica, I., Morris, R., Karger, D., Kaashoek, M., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Proc. Annual ACM Conference of the Special Interest Group on Data Communication (SIGCOMM) (August 2001)
    • Stoica, I., Morris, R., Karger, D., Kaashoek, M., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Proc. Annual ACM Conference of the Special Interest Group on Data Communication (SIGCOMM) (August 2001)
  • 32
    • 33847090792 scopus 로고    scopus 로고
    • March
    • Gnutella forum: Gnutella (March 2001), http://www.gnutella.com
    • (2001) Gnutella
  • 33
    • 57149089827 scopus 로고    scopus 로고
    • Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: a distributed anonymous information storage and retrieval system. In: Proc. ICSIWorkshop on Design Issues in Anonymity and Unobservability (July 2000)
    • Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: a distributed anonymous information storage and retrieval system. In: Proc. ICSIWorkshop on Design Issues in Anonymity and Unobservability (July 2000)
  • 36
    • 0036187056 scopus 로고    scopus 로고
    • Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design
    • Ripeanu, M., Foster, I., Iamnitchi, A.: Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal 6, 50 (2002)
    • (2002) IEEE Internet Computing Journal , vol.6 , pp. 50
    • Ripeanu, M.1    Foster, I.2    Iamnitchi, A.3
  • 37
    • 0003716689 scopus 로고    scopus 로고
    • Scalability issues in large peer-to-peer networks - a case study of gnutella
    • Technical report, University of Cincinnati January
    • Jovanovic, M., Annexstein, F., Berman, K.: Scalability issues in large peer-to-peer networks - a case study of gnutella. Technical report, University of Cincinnati (January 2001)
    • (2001)
    • Jovanovic, M.1    Annexstein, F.2    Berman, K.3
  • 38
    • 0035420732 scopus 로고    scopus 로고
    • Random graphs with arbitrary degree distributions and their applications
    • 026118
    • Newman, M., Strogatz, S., Watts, D.: Random graphs with arbitrary degree distributions and their applications. Physical Review E 64(026118) (2001)
    • (2001) Physical Review E , vol.64
    • Newman, M.1    Strogatz, S.2    Watts, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.