메뉴 건너뛰기




Volumn , Issue , 2009, Pages 156-162

Detecting botnets using command and control traffic

Author keywords

Botnet detection; Discrete time series analysis; Periodogram; SLINGbot; Walker large sample test

Indexed keywords

BOTNET DETECTION; DISCRETE TIME SERIES ANALYSIS; PERIODOGRAM; SLINGBOT; WALKER LARGE SAMPLE TEST;

EID: 70449416204     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2009.56     Document Type: Conference Paper
Times cited : (55)

References (20)
  • 1
    • 70449350303 scopus 로고    scopus 로고
    • Over 1 million potential victims of botnet cyber crime, FBI Press Release, Jun. 13, 2007.
    • "Over 1 million potential victims of botnet cyber crime," FBI Press Release, Jun. 13, 2007.
  • 2
    • 70449334059 scopus 로고    scopus 로고
    • 'Bot roast II' nets 8 individuals, FBI Press Release, Nov. 29, 2007.
    • "'Bot roast II' nets 8 individuals," FBI Press Release, Nov. 29, 2007.
  • 3
    • 70449368066 scopus 로고    scopus 로고
    • Symantec global internet security threat report, trends for July- December 07, XIII, Symantec Corp, Apr. 2008.
    • "Symantec global internet security threat report, trends for July- December 07, volume XIII," Symantec Corp, Apr. 2008.
  • 4
    • 70449419572 scopus 로고    scopus 로고
    • Most spam comes from just six botnets
    • Feb. 29
    • J. Leyden, "Most spam comes from just six botnets," The Register, Feb. 29, 2008.
    • (2008) The Register
    • Leyden, J.1
  • 5
    • 68149177571 scopus 로고    scopus 로고
    • Criminals 'may overwhelm the web',
    • Jan. 25
    • T. Weber, "Criminals 'may overwhelm the web'," BBC News, Jan. 25, 2007.
    • (2007) BBC News
    • Weber, T.1
  • 9
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol and structure-independent botnet detection
    • San Jose, CA, USA, Jul. 28-Aug. 1
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee, "BotMiner: Clustering analysis of network traffic for protocol and structure-independent botnet detection," in the 17th USENIX Security Symposium (Security'08), San Jose, CA, USA, Jul. 28-Aug. 1, 2008.
    • (2008) the 17th USENIX Security Symposium (Security'08)
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 15
    • 70449419566 scopus 로고    scopus 로고
    • Periodic behavior in botnet command and control channels traffic
    • unpublished
    • B. AsSadhan, J. M. F. Moura, and D. Lapsley, "Periodic behavior in botnet command and control channels traffic," unpublished.
    • AsSadhan, B.1    Moura, J.M.F.2    Lapsley, D.3
  • 18
    • 47949132450 scopus 로고    scopus 로고
    • Taxonomy of botnet threats
    • TrenMicro, Technical report, Nov
    • "Taxonomy of botnet threats," TrenMicro, Technical report, Nov. 2006.
    • (2006)
  • 19
    • 70449419567 scopus 로고    scopus 로고
    • LBNL/ICSI enterprise tracing project
    • "LBNL/ICSI enterprise tracing project," http://www.icir.org/ enterprisetracing/,2005.
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.