메뉴 건너뛰기




Volumn , Issue , 2009, Pages 106-113

A first step towards characterizing stealthy botnets

Author keywords

Botnet C C; Botnet characteristics; Botnet modeling; Botnet stealth management; Stealthy botnets

Indexed keywords

BOTNET CHARACTERISTICS; BOTNET MODELING; BOTNET STEALTH MANAGEMENT; BOTNETS; COMMAND AND CONTROL; CYBER THREATS; DETECTION MECHANISM; STEALTH TECHNIQUE; STEALTHY BOTNETS;

EID: 70349706233     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.63     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 1
    • 70349663476 scopus 로고    scopus 로고
    • P. Bacher, T. Holz, M. Kotter, and G. Wicherski. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/ bots/, dated on 13 March 2005.
    • P. Bacher, T. Holz, M. Kotter, and G. Wicherski. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/ bots/, dated on 13 March 2005.
  • 3
    • 84888402098 scopus 로고    scopus 로고
    • The zombie roundup: Understanding, detecting, and disrupting botnets
    • E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In SRUTI'05.
    • SRUTI'05
    • Cooke, E.1    Jahanian, F.2    McPherson, D.3
  • 5
    • 84891429894 scopus 로고    scopus 로고
    • Modeling botnet propagation using time zones
    • D. Dagon, C. Zou, and W. Lee. Modeling botnet propagation using time zones. In Proc. NDSS'06, 2006.
    • (2006) Proc. NDSS'06
    • Dagon, D.1    Zou, C.2    Lee, W.3
  • 6
    • 70349695671 scopus 로고    scopus 로고
    • Botnet tracking: Exploring a root-cause methodology to prevent denial-ofservice attaks
    • F. Freiling, T. Holz, and G. Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent denial-ofservice attaks. In ESORICS'05.
    • ESORICS'05
    • Freiling, F.1    Holz, T.2    Wicherski, G.3
  • 8
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clusteringanalysis of network traffic for protocol- and structureindependent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clusteringanalysis of network traffic for protocol- and structureindependent botnet detection. In USENIX Security'08.
    • USENIX Security'08
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 10
    • 51949091400 scopus 로고    scopus 로고
    • Botsniffer: Detecting botnet command and control channels in network traffic
    • G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In NDSS'08.
    • NDSS'08
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 13
    • 70349652792 scopus 로고    scopus 로고
    • Using machine learning techniques to identify botnet traffic
    • C. Livadas, R. Walsh, D. Lapsley, and W. Strayer. Using machine learning techniques to identify botnet traffic. In WNS'06.
    • WNS'06
    • Livadas, C.1    Walsh, R.2    Lapsley, D.3    Strayer, W.4
  • 14
    • 70349686313 scopus 로고    scopus 로고
    • Trend Micro. Taxonomy of botnet threats (white paper), November 2006.
    • Trend Micro. Taxonomy of botnet threats (white paper), November 2006.
  • 15
    • 34547399387 scopus 로고    scopus 로고
    • A multifaceted approach to understanding the botnet phenomenon
    • M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In IMC'06.
    • IMC'06
    • Rajab, M.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 16
    • 77952717608 scopus 로고    scopus 로고
    • Revealing botnet membership using dnsbl counter-intelligence
    • A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership using dnsbl counter-intelligence. InSRUTI'06.
    • SRUTI'06
    • Ramachandran, A.1    Feamster, N.2    Dagon, D.3
  • 18
    • 70349658991 scopus 로고    scopus 로고
    • Characterizing bots' remote ontrol behavior
    • E. Stinson and J. Mitchell. Characterizing bots' remote ontrol behavior. In DIMVA'07.
    • DIMVA'07
    • Stinson, E.1    Mitchell, J.2
  • 22
    • 58449108281 scopus 로고    scopus 로고
    • Traffic aggregation for malware detection
    • T. Yen and M. Reiter. Traffic aggregation for malware detection. In DIMVA'08.
    • DIMVA'08
    • Yen, T.1    Reiter, M.2
  • 24
    • 70349680241 scopus 로고    scopus 로고
    • Honeypot-aware advanced botnet construction and maintenance
    • C. Zou and R. Cunningham. Honeypot-aware advanced botnet construction and maintenance. DSN'06.
    • DSN'06
    • Zou, C.1    Cunningham, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.