메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1978-1984

Botzilla: Detecting the "phoning home" of malicious software

Author keywords

malicious software; network intrusion detection

Indexed keywords

CONTROLLED ENVIRONMENT; IN-NETWORK; MALICIOUS CODES; MALICIOUS SOFTWARE; MALWARES; NETWORK TRAFFIC; SOFTWARE VULNERABILITIES;

EID: 77954740531     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1774088.1774506     Document Type: Conference Paper
Times cited : (55)

References (28)
  • 4
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In Proc. of USENIX Security Symposium, 2008.
    • Proc. of USENIX Security Symposium, 2008
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 13
    • 84879974400 scopus 로고    scopus 로고
    • Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions
    • Kassel, Germany, March Springer
    • T. Limmer and F. Dressler. Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions. In 16. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009), pages 179-190, Kassel, Germany, March 2009. Springer.
    • (2009) 16. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009) , pp. 179-190
    • Limmer, T.1    Dressler, F.2
  • 18
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • December
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Elsevier Computer Networks, 31(23-24):2435-2463, December 1999.
    • (1999) Elsevier Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 24
    • 49049107082 scopus 로고    scopus 로고
    • Analysis of the Storm and Nugache Trojans: P2P is here
    • S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the Storm and Nugache Trojans: P2P is here. USENIX ;login:, 32(6):18-27, 2007.
    • (2007) USENIX;login , vol.32 , Issue.6 , pp. 18-27
    • Stover, S.1    Dittrich, D.2    Hernandez, J.3    Dietrich, S.4
  • 25
    • 69249090883 scopus 로고    scopus 로고
    • Symantec. April Trends for July - December 07
    • Symantec. Global Internet Security Threat Report, April 2008. Trends for July - December 07.
    • (2008) Global Internet Security Threat Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.