메뉴 건너뛰기




Volumn 36, Issue , 2008, Pages 143-164

A taxonomy of Botnet structures

Author keywords

[No Author keywords available]

Indexed keywords


EID: 67650349218     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-68768-1_8     Document Type: Article
Times cited : (15)

References (64)
  • 4
    • 0036013593 scopus 로고    scopus 로고
    • Statistical mechanics of complex networks
    • Réka Albert and Alert-László Barabási. Statistical mechanics of complex networks. Reviews of Modern Physics, 74(1), 2002.
    • (2002) Reviews of Modern Physics , vol.74 , Issue.1
    • Albert, R.1    Barabási, A.2
  • 5
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Réka Albert, Hawoong Jeong, and Alert-Lászloó Barabási. Error and attack tolerance of complex networks. Nature, 406:378-382, 2000.
    • (2000) Nature , vol.406 , pp. 378-382
    • Réka, A.1    Jeong, H.2    Barabási, A.3
  • 9
  • 32
    • 48649095253 scopus 로고    scopus 로고
    • LURHQ
    • LURHQ. Zindos worm analysis. http://www.lurhq.com/zindos.html,2004.
    • (2004) Zindos Worm Analysis
  • 35
    • 47949132450 scopus 로고    scopus 로고
    • November Trend Micro, Technical report, Trend Micro White Paper
    • Trend Micro. Taxonomy of botnet threats. Technical report, Trend Micro White Paper, November 2006.
    • (2006) Taxonomy of Botnet Threats
  • 36
    • 0002687371 scopus 로고
    • The small world problem
    • S. Milgram. The small world problem. Psychology Today, 2(60), 1967.
    • (1967) Psychology Today , vol.2 , Issue.60
    • Milgram, S.1
  • 40
    • 48649088885 scopus 로고    scopus 로고
    • Technical Report UCAM-CL-TR-637, University of Cambridge, July
    • Shishir Nagarja and Ross Anderson. The topology of covert conflict. Technical Report UCAM-CL-TR-637, University of Cambridge, July 2005.
    • (2005) The Topology of Covert Conflict
    • Nagarja, S.1    Anderson, R.2
  • 41
    • 48649084321 scopus 로고    scopus 로고
    • Botnet tracking: Tools, techniques, and lessons learned
    • Jose Nazario. Botnet tracking: Tools, techniques, and lessons learned. In Black Hat, 2007.
    • (2007) Black Hat
    • Nazario, J.1
  • 42
    • 0035420732 scopus 로고    scopus 로고
    • Random graphs with arbitrary degree distributions and their applications
    • 026118
    • M.E.J. Newman, S.H. Strogatz, and D.J. Watts. Random graphs with arbitrary degree distributions and their applications. Phys. Rev., E64(026118), 2001.
    • (2001) Phys. Rev , vol.E64
    • Newman, M.E.J.1    Strogatz, S.H.2    Watts, D.J.3
  • 43
    • 70350283482 scopus 로고    scopus 로고
    • Average web usage
    • Nielsen NetRatings. Average web usage. http://www.nielsen-netratings.com/reports.jsp?section=pub_reports&repor%t=usage&period=weekly, 2007.
    • (2007) Nielsen NetRatings
  • 49
    • 0036187056 scopus 로고    scopus 로고
    • Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design
    • M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 6(1), 2002.
    • (2002) IEEE Internet Computing Journal , vol.6 , Issue.1
    • Ripeanu, M.1    Foster, I.2    Iamnitchi, A.3
  • 53
    • 44649101679 scopus 로고    scopus 로고
    • Technical report, Department of Computer Science, University of Calgary, August
    • Ryan Vogt and John Aycock. Attack of the 50 foot botnet. Technical report, Department of Computer Science, University of Calgary, August 2006.
    • (2006) Attack of the 50 Foot Botnet
    • Vogt, R.1    Aycock, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.