메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-10

Automatic discovery of botnet communities on large-scale communication networks

Author keywords

Botnet detection; Machine learning; Traffic classification

Indexed keywords

AUTOMATIC DISCOVERY; BOTNETS; COMMAND AND CONTROL; COMMUNICATION NETWORKS; CROSS-ASSOCIATION; FALSE ALARM RATE; HIGH DETECTION RATE; HONEYPOTS; HUMAN BEING; INTERNET INFRASTRUCTURE; MACHINE-LEARNING; MALICIOUS CODES; NETWORK APPLICATIONS; NETWORK LINKS; NETWORK TRAFFIC; ON CURRENTS; PEER TO PEER; SECURITY THREATS; TRAFFIC CLASSIFICATION;

EID: 77952376102     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1533057.1533062     Document Type: Conference Paper
Times cited : (62)

References (46)
  • 1
    • 77952334842 scopus 로고    scopus 로고
    • Symantec Internet Security Threat Report, April
    • http://www.symantec.com/business/theme.jsp?themeid=threa treport, Symantec Internet Security Threat Report, Volume XIII: April, 2008
    • (2008) , vol.13
  • 3
    • 77952375044 scopus 로고    scopus 로고
    • available on and assessed in December
    • Sinit, available on and assessed in December 2008 http://www.secureworks. com/research/threats/sinit
    • (2008)
    • Sinit1
  • 4
    • 77952330158 scopus 로고    scopus 로고
    • available on and assessed in December
    • Phatbot, available on and assessed in December 2008 http://www. secureworks.com/research/threats/phatbot
    • (2008)
    • Phatbot1
  • 5
    • 77952402734 scopus 로고    scopus 로고
    • available on and assessed in December
    • Nugache, available on and assessed in December 2008 http://www. securityfocus.com/news/11390
    • (2008)
    • Nugache1
  • 6
    • 77952365684 scopus 로고    scopus 로고
    • http://www.secureworks.com/research/blog/index.php/2007/09/12/ analysis-of-storm-worm-ddos-traffic
  • 11
    • 84881411869 scopus 로고    scopus 로고
    • Honeynet-based botnet scan traffic analysis
    • Series: Advances in Information Security, W. K. Lee, C. Wang, D. Dagon, Eds., Springer, ISBN: 978-0-387-68766-7
    • Z. H. Li, A. Goyal, and Y. Chen, "Honeynet-based botnet scan traffic analysis, " Botnet Detection: Countering the Largest Security Threat, in Series: Advances in Information Security, Vol. 36, W. K. Lee, C. Wang, D. Dagon, (Eds.), Springer, ISBN: 978-0-387-68766-7, 2008.
    • (2008) Botnet Detection: Countering the Largest Security Threat , vol.36
    • Li, Z.H.1    Goyal, A.2    Chen, Y.3
  • 15
    • 67249165178 scopus 로고    scopus 로고
    • Botnet detection based on network behavior
    • Series: Advances in Information Security, W. K. Lee, C. Wang, D. Dagon, Eds., Springer
    • T. Strayer, D. Lapsley, R. Walsh, and C. Livadas, "Botnet detection based on network behavior, " Botnet Detection: Countering the Largest Security Threat, in Series: Advances in Information Security, Vol. 36, W. K. Lee, C. Wang, D. Dagon, (Eds.), Springer, 2008.
    • (2008) Botnet Detection: Countering the Largest Security Threat , vol.36
    • Strayer, T.1    Lapsley, D.2    Walsh, R.3    Livadas, C.4
  • 17
    • 85093871360 scopus 로고    scopus 로고
    • Rishi: Identify bot contaminated hosts by irc nickname evaluation
    • J. Goebel and T. Holz, "Rishi: Identify bot contaminated hosts by irc nickname evaluation, " In Proceedings of USENIX HotBots'07, 2007.
    • (2007) Proceedings of USENIX HotBots'07
    • Goebel, J.1    Holz, T.2
  • 23
    • 33750283653 scopus 로고    scopus 로고
    • A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification
    • N. Williams, S. Zander and G. Armitage, "A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification, " ACM SIGCOMM Computer Communication Review, Vol. 36, Issue 5, pp. 5-16, 2006.
    • (2006) ACM SIGCOMM Computer Communication Review , vol.36 , Issue.5 , pp. 5-16
    • Williams, N.1    Zander, S.2    Armitage, G.3
  • 27
    • 33244467936 scopus 로고    scopus 로고
    • Internet traffic classification using bayesian analysis techniques
    • A. Moore, D. Zuev, "Internet traffic classification using Bayesian analysis techniques, " ACM SIGMETRICS Performance Evaluation Review, Vol. 30, Issue 1, pp. 50-60, 2005.
    • (2005) ACM SIGMETRICS Performance Evaluation Review , vol.30 , Issue.1 , pp. 50-60
    • Moore, A.1    Zuev, D.2
  • 34
    • 77952349242 scopus 로고    scopus 로고
    • Fred-eZone WiFi ISP, available on and assessed in December
    • Fred-eZone WiFi ISP, available on and assessed in December 2008 http://www.fred-ezone.ca
    • (2008)
  • 41
    • 77952405126 scopus 로고    scopus 로고
    • Kaiten, available on and assessed in December
    • Kaiten, available on and assessed in December 2008 http:// packetstormsecurity.org/distributed/indexsize.html
    • (2008)
  • 42
    • 77952407910 scopus 로고    scopus 로고
    • BlackEnergy, available on and assessed in December
    • BlackEnergy, available on and assessed in December 2008 http://atlas-public.ec2.arbor.net/docs/BlackEnergy+DDoS+ Bot+Analysispdf
    • (2008)
  • 46
    • 77952358661 scopus 로고    scopus 로고
    • German Honeynet Project, assessed in Dec
    • German Honeynet Project, assessed in Dec. 2008 http://pi1.informatik.uni- mannheim.de/index.php? pagecontent=site/Research.menu/Honeynet.page
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.