메뉴 건너뛰기




Volumn 2009, Issue , 2009, Pages

Botnet: Classification, attacks, detection, tracing, and preventive measures

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; CLASSIFICATION ,; FUNDAMENTAL CONCEPTS; INITIAL STAGES; POSSIBLE FUTURES; PREVENTIVE MEASURES; WIRED AND WIRELESS;

EID: 70449412215     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1155/2009/692654     Document Type: Article
Times cited : (97)

References (49)
  • 2
    • 56149114543 scopus 로고    scopus 로고
    • Wikipedia http://en.wikipedia.org/wiki/Internetbot
    • Wikipedia, Internet bot. http://en.wikipedia.org/wiki/Internetbot
    • Internet Bot
  • 3
    • 70449403675 scopus 로고    scopus 로고
    • Wikipedia http://en.wikipedia.org/wiki/Botnet
    • Wikipedia, Botnet. http://en.wikipedia.org/wiki/Botnet
    • Botnet
  • 6
    • 3042784584 scopus 로고    scopus 로고
    • Botnets: Big and bigger
    • McCarty B., Botnets: big and bigger IEEE Security and Privacy 2003 1 4 87 90
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 87-90
    • McCarty, B.1
  • 7
    • 33746642190 scopus 로고    scopus 로고
    • Worms and viruses and botnets, oh my!: Rational responses to emerging internet threats
    • Schaffer G. P., Worms and viruses and botnets, oh my!: rational responses to emerging internet threats IEEE Security and Privacy 2006 4 3 52 58
    • (2006) IEEE Security and Privacy , vol.4 , Issue.3 , pp. 52-58
    • Schaffer, G.P.1
  • 12
    • 3042826619 scopus 로고    scopus 로고
    • The making of a spam zombie army: Dissecting the sobig worms
    • Levy E., The making of a spam zombie army: dissecting the sobig worms IEEE Security and Privacy 2003 1 4 58 59
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 58-59
    • Levy, E.1
  • 28
    • 78649306695 scopus 로고    scopus 로고
    • http://www.secureworks.com/research/threats/sinit/
    • Stewart J., Sinit P2P Trojan analysis. http://www.secureworks.com/ research/threats/sinit/
    • Sinit P2P Trojan Analysis
    • Stewart, J.1
  • 31
    • 33646054897 scopus 로고    scopus 로고
    • Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
    • September Milan, Italy Springer Lecture Notes in Computer Science
    • Freiling F. C., Holz T., Wicherski G., Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks 3679 Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 05) September 2005 Milan, Italy Springer 319 335 Lecture Notes in Computer Science
    • (2005) Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 05) , vol.3679 , pp. 319-335
    • Freiling, F.C.1    Holz, T.2    Wicherski, G.3
  • 32
    • 44649107712 scopus 로고    scopus 로고
    • Back to basics to fight botnets
    • Pappas K., Back to basics to fight botnets Communications News 2008 45 5 12
    • (2008) Communications News , vol.45 , Issue.5 , pp. 12
    • Pappas, K.1
  • 40
    • 70449362107 scopus 로고    scopus 로고
    • Remote detection via simple probe packet
    • Honeyd security advisory 2004001, Remote detection via simple probe packet. 2004, http://www.honeyd.org/adv.2004-01.asc
    • (2004) Honeyd Security Advisory 2004001
  • 42
    • 2342615538 scopus 로고    scopus 로고
    • Anti-Honeypot technology
    • Krawetz N., Anti-Honeypot technology IEEE Security and Privacy 2004 2 1 76 79
    • (2004) IEEE Security and Privacy , vol.2 , Issue.1 , pp. 76-79
    • Krawetz, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.