메뉴 건너뛰기




Volumn 6201 LNCS, Issue , 2010, Pages 81-100

Take a deep breath: A stealthy, resilient and cost-effective botnet using skype

Author keywords

[No Author keywords available]

Indexed keywords

CLOSED SOURCE; DISTRIBUTED APPLICATIONS; INSTANT MESSAGING; LOW COSTS; P2P APPLICATIONS; PEER-TO-PEER SOFTWARE; PLUG-INS; REVERSE ENGINEERS;

EID: 77955020947     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14215-4_5     Document Type: Conference Paper
Times cited : (22)

References (52)
  • 3
    • 77955033852 scopus 로고    scopus 로고
    • An analysis of the Skype peer-to-peer internet telephony protocol
    • Baset, S., Schulzrinne, H.: An analysis of the Skype peer-to-peer internet telephony protocol. In: CoRR (2004)
    • (2004) CoRR
    • Baset, S.1    Schulzrinne, H.2
  • 5
    • 85080378133 scopus 로고    scopus 로고
    • An algorithm for anomaly-based botnet detection
    • Binkley, J.R.: An algorithm for anomaly-based botnet detection. In: SRUTI 2006 (2006)
    • (2006) SRUTI 2006
    • Binkley, J.R.1
  • 8
    • 11944253901 scopus 로고    scopus 로고
    • Cambridge University Press Cambridge (January)
    • Bollob́as, B.: Random Graphs. Cambridge University Press, Cambridge (January 2001)
    • (2001) Random Graphs
    • Bollob́as, B.1
  • 9
    • 77955018674 scopus 로고    scopus 로고
    • Mining the network behavior of bots
    • Department of Computer Science, University of California at Santa Barbara (UCSB), CA, USA (July)
    • Cavallaro, L., Kruegel, C., Vigna, G.: Mining the network behavior of bots. Tech. Rep. 2009-2012, Department of Computer Science, University of California at Santa Barbara (UCSB), CA, USA (July 2009)
    • (2009) Tech. Rep. 2009-2012
    • Cavallaro, L.1    Kruegel, C.2    Vigna, G.3
  • 11
    • 47949109162 scopus 로고    scopus 로고
    • Improving sender anonymity in a structured overlay with imprecise routing
    • Springer, Heidelberg
    • Ciaccio, G.: Improving sender anonymity in a structured overlay with imprecise routing. LNCS. Springer, Heidelberg (2006)
    • (2006) LNCS
    • Ciaccio, G.1
  • 12
    • 52049095294 scopus 로고    scopus 로고
    • July
    • CNET News. Hacking for dollars (July 2005), http://news.cnet.com/Hacking- for-dollars/2100-7349-3-5772238.html
    • (2005) Hacking for Dollars
  • 15
  • 22
    • 84870637050 scopus 로고    scopus 로고
    • Gnutella Development Forum
    • Gnutella Development Forum. Gnutella protocol specification, http://wiki.limewire.org/index.php?title=GDF
    • Gnutella Protocol Specification
  • 24
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: Proceedings of the 17th USENIX Security Symposium (2008)
    • (2008) Proceedings of the 17th USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 28
    • 77955036937 scopus 로고    scopus 로고
    • Congestion control and message loss in Gnutella networks
    • He, Q., Ammar, M.: Congestion control and message loss in Gnutella networks. In: Proceedings of SPIE (2003)
    • (2003) Proceedings of SPIE
    • He, Q.1    Ammar, M.2
  • 35
    • 56549121841 scopus 로고    scopus 로고
    • A layered architecture for detecting malicious behaviors
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A Layered Architecture for Detecting Malicious Behaviors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.5230, pp. 78-97. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 78-97
    • Martignoni, L.1    Stinson, E.2    Fredrikson, M.3    Jha, S.4    Mitchell, J.C.5
  • 37
    • 49949091964 scopus 로고    scopus 로고
    • FLuXOR: Detecting and monitoring fast-flux service networks
    • Springer, Heidelberg
    • Passerini, E., Paleari, R., Martignoni, L., Bruschi, D.: FLuXOR: Detecting and Monitoring Fast-Flux Service Networks. LNCS. Springer, Heidelberg (2008)
    • (2008) LNCS
    • Passerini, E.1    Paleari, R.2    Martignoni, L.3    Bruschi, D.4
  • 40
    • 48649089285 scopus 로고    scopus 로고
    • Distributed routing in small-world networks
    • Sandberg, O.: Distributed routing in small-world networks. In: ALENEX 2006 (2006)
    • (2006) ALENEX 2006
    • Sandberg, O.1
  • 42
    • 77955015348 scopus 로고    scopus 로고
    • Sissel, J.: xdotool, http://www.semicomplete.com/projects/xdotool/
    • Xdotool
    • Sissel, J.1
  • 50
    • 70350374367 scopus 로고    scopus 로고
    • Automatically generating models for botnet detection
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Wurzinger, P., Bilge, L., Holz, T., Goebel, J., Kruegel, C., Kirda, E.: Automatically Generating Models for Botnet Detection. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.5789, pp. 232-249. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 232-249
    • Wurzinger, P.1    Bilge, L.2    Holz, T.3    Goebel, J.4    Kruegel, C.5    Kirda, E.6
  • 51
    • 49949094072 scopus 로고    scopus 로고
    • Traffic aggregation for malware detection
    • Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
    • Yen, T.-F., Reiter, M.K.: Traffic Aggregation for Malware Detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.5137, pp. 207-227. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 207-227
    • Yen, T.-F.1    Reiter, M.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.