메뉴 건너뛰기




Volumn , Issue , 2008, Pages 41-48

P2P as botnet command and control: A deeper insight

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; COMMAND AND CONTROLS; INCREMENTAL IMPROVEMENTS; MALICIOUS SOFTWARES; P2P FILE SHARING; P2P TECHNOLOGIES; PEER TO PEERS; RESEARCH COMMUNITIES;

EID: 58149088212     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2008.4690856     Document Type: Conference Paper
Times cited : (81)

References (30)
  • 4
    • 58149091623 scopus 로고    scopus 로고
    • Discovery techniques for P2P botnets
    • Technical Report CS 2008-4, Stevens Institute of Technology, September
    • D. Dittrieh and S. Dietrich. Discovery techniques for P2P botnets. Technical Report CS 2008-4, Stevens Institute of Technology, September 2008.
    • (2008)
    • Dittrieh, D.1    Dietrich, S.2
  • 6
    • 58149096198 scopus 로고    scopus 로고
    • Technical Report CS 2008-3. Stevens Institute of Technology, June
    • D. Dittrieh and S. Dietrich. Technical Report CS 2008-3. Stevens Institute of Technology, June 2008.
    • (2008)
    • Dittrieh, D.1    Dietrich, S.2
  • 7
    • 58149085697 scopus 로고    scopus 로고
    • Storm, Nugache lead dangerous new botnet barrage
    • December, 289142,sidl4.gcil286808,00.html
    • D. Fischer. Storm, Nugache lead dangerous new botnet barrage. SearchSecurity.com, December 2007. http://searchsecurity.techtarget.com/ news/article/0,289142,sidl4.gcil286808,00.html.
    • (2007) SearchSecurity.com
    • Fischer, D.1
  • 9
    • 20844452458 scopus 로고    scopus 로고
    • A short visit to the bot zoo
    • May-June
    • T. Holz. A short visit to the bot zoo. IEEE Security & Privacy Magazine, 3(3):76-79, May-June 2005.
    • (2005) IEEE Security & Privacy Magazine , vol.3 , Issue.3 , pp. 76-79
    • Holz, T.1
  • 11
    • 58149101353 scopus 로고    scopus 로고
    • B. Kaliski. PKCS #1: RSA Encryption version 1.5. RFC 2313, Internet Engineering Task Force, 1998
    • B. Kaliski. PKCS #1: RSA Encryption version 1.5. RFC 2313, Internet Engineering Task Force, 1998.
  • 13
    • 58149095086 scopus 로고    scopus 로고
    • Cheyenne teen pleads guilty to computer crime
    • August
    • J. Miller. Cheyenne teen pleads guilty to computer crime. Star-Tribune, August 2008. http://www.casperstartribune.net/articles/ 2008/08/16/news/casper/2c6fb0ecfe2ddf6c872574a700057d26.txt.
    • (2008) Star-Tribune
    • Miller, J.1
  • 14
    • 48649088885 scopus 로고    scopus 로고
    • The topology of covert conflict
    • Technical Report UCAM-CL-TR-637, University of Cambridge, July
    • S. Nagaraja and R. Anderson. The topology of covert conflict. Technical Report UCAM-CL-TR-637, University of Cambridge, July 2005.
    • (2005)
    • Nagaraja, S.1    Anderson, R.2
  • 15
    • 58149089569 scopus 로고    scopus 로고
    • Bot, May
    • J. Nazario. Nugache: TCP port 8 Bot, May 2006. http://asert. arbornetworks.com/2006/05/nugache-tcp-port-8-bot/.
    • (2006) Nugache: TCP port , vol.8
    • Nazario, J.1
  • 17
    • 44649128920 scopus 로고    scopus 로고
    • A Multi-perspective Analysis of the Storm (Peacomm) Worm
    • Technical report, Computer Science Laboratory, SRI International
    • P. Porras, H. Saidi, and V. Yegneswaran. A Multi-perspective Analysis of the Storm (Peacomm) Worm. Technical report, Computer Science Laboratory, SRI International, 2007.
    • (2007)
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 21
    • 49049107082 scopus 로고    scopus 로고
    • Analysis of the Storm and Nugache Trojans: P2P is here
    • December
    • S. Stover, D. Dittrieh, J. Hernandez, and S. Dietrich. Analysis of the Storm and Nugache Trojans: P2P is here. In USENIX; login: vol. 32, no. 6, December 2007.
    • (2007) USENIX; login , vol.32 , Issue.6
    • Stover, S.1    Dittrieh, D.2    Hernandez, J.3    Dietrich, S.4
  • 22
    • 58149083207 scopus 로고    scopus 로고
    • The Honeynet Project. Honeynet Definitions, Requirements, and Standards version 1.6.0, 2004
    • The Honeynet Project. Honeynet Definitions, Requirements, and Standards version 1.6.0, 2004. http://www.honeynet.org/alliance/requirement s.html.
  • 23
    • 58149094302 scopus 로고    scopus 로고
    • The Honeynet Project
    • The Honeynet Project. Honeywall, 2005. http://www.honeynet.org/papers/ cdrom/.
    • (2005) Honeywall
  • 25
    • 58149100791 scopus 로고    scopus 로고
    • Trend Micro. TROJ-DLOADER.IBZ, December 2006. http://www.trendmicro.com/ vinfo/virusencyclo/default5.asp?VName=TROJ/DLOADER.IBZ.
    • Trend Micro. TROJ-DLOADER.IBZ, December 2006. http://www.trendmicro.com/ vinfo/virusencyclo/default5.asp?VName=TROJ/DLOADER.IBZ.
  • 26
    • 58149097890 scopus 로고    scopus 로고
    • December 2006
    • Trend Micro. WORM.NUGACHE.G. http://www.trendmicro.com/vinfo/ virusencyclo/default5. asp?VName=WORM\-NUGACHE.G, December 2006.
    • Trend Micro. WORM.NUGACHE.G
  • 27
    • 58149089218 scopus 로고    scopus 로고
    • December
    • Trend Micro. WORM-NUGACHE.G (Japanese web site), December 2006. http://blog. trendmicro.co.jp/archives/1053.
    • (2006) G (Japanese web site)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.