메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 594-599

A Framework for P2P botnets

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; ENTERPRISE NETWORKS; GAIN INSIGHTS; PEER TO PEERS; POTENTIAL MECHANISMS;

EID: 64749085302     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CMC.2009.268     Document Type: Conference Paper
Times cited : (17)

References (16)
  • 1
    • 64749104904 scopus 로고    scopus 로고
    • http://www.honeynet.org/papers/bots.
  • 2
    • 64749094061 scopus 로고    scopus 로고
    • K. A, R. B, and H. D. Wide-scale botnet detection and characterization. In HotBots, 2007.
    • K. A, R. B, and H. D. Wide-scale botnet detection and characterization. In HotBots, 2007.
  • 3
    • 64749108264 scopus 로고    scopus 로고
    • M. Bailey, E. Cooke, D.Watson, F. Jahanian, and N. Provos. hybrid honeypot architecture for scalable network monitoring. Technical report, October 2004.
    • M. Bailey, E. Cooke, D.Watson, F. Jahanian, and N. Provos. hybrid honeypot architecture for scalable network monitoring. Technical report, October 2004.
  • 4
    • 64749110302 scopus 로고    scopus 로고
    • Node behavior based detection for p2p botnets in enterprise network environments
    • submitted to NDSS
    • S. Chang and T. E. Daniels. Node behavior based detection for p2p botnets in enterprise network environments. submitted to NDSS, 2009.
    • (2009)
    • Chang, S.1    Daniels, T.E.2
  • 5
    • 48649089769 scopus 로고    scopus 로고
    • D. Dagon, G. Gu, C. Lee, andW. Lee. A taxonomy of botnet structures. In ACSAC, 2007.
    • D. Dagon, G. Gu, C. Lee, andW. Lee. A taxonomy of botnet structures. In ACSAC, 2007.
  • 7
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection. In Security, 2008.
    • (2008) Security
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 9
    • 85175133385 scopus 로고    scopus 로고
    • Botsniffer: Detecting botnet command and control channels in network traffic
    • G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In NDSS, 2008.
    • (2008) NDSS
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 10
    • 64749098996 scopus 로고    scopus 로고
    • G. JB, S. V, and N. C. Peer-to-peer botnets: Overview and case study. In Proc. of the 1st Workshop on Hot Topics in Understanding Botnets, 2007.
    • G. JB, S. V, and N. C. Peer-to-peer botnets: Overview and case study. In Proc. of the 1st Workshop on Hot Topics in Understanding Botnets, 2007.
  • 13
    • 77952717608 scopus 로고    scopus 로고
    • Revealing botnet membership with dnsbl counter-intelligence
    • A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership with dnsbl counter-intelligence. In SRUTI, 2006.
    • (2006) SRUTI
    • Ramachandran, A.1    Feamster, N.2    Dagon, D.3
  • 14
    • 44649101679 scopus 로고    scopus 로고
    • Attack of the 50 foot botnet
    • Technical report
    • R. Vogt and J. Aycock. Attack of the 50 foot botnet. Technical report, 2006.
    • (2006)
    • Vogt, R.1    Aycock, J.2
  • 16
    • 33845590556 scopus 로고    scopus 로고
    • C. Zou and R. Cunningham. Honeypot-aware advanced botnet construction and maintenance. In DSN, 2006.
    • C. Zou and R. Cunningham. Honeypot-aware advanced botnet construction and maintenance. In DSN, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.