메뉴 건너뛰기




Volumn 6201 LNCS, Issue , 2010, Pages 61-80

Evaluating Bluetooth as a medium for botnet command and control

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; COMMAND AND CONTROL; DEFENSE MECHANISM; DEFENSIVE STRATEGIES; LARGE SCALE SIMULATIONS; MALWARES; NEAR-FIELD COMMUNICATION; RESEARCH COMMUNITIES;

EID: 77955030814     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14215-4_4     Document Type: Conference Paper
Times cited : (68)

References (39)
  • 1
    • 77955015710 scopus 로고    scopus 로고
    • Grand Central Terminal, (last accessed Feburary 2, 2010)
    • Grand Central Terminal, http://en.wikipedia.org/wiki/Grand-Central- Terminal (last accessed Feburary 2, 2010)
  • 2
    • 77955014246 scopus 로고    scopus 로고
    • MTA NYC Transit, (last accessed Feburary 2, 2010)
    • MTA NYC Transit: 2007 Ridership by Subway Station (2007), http://www.mta.info/nyct/facts/ridership/ridership-sub.htm (last accessed Feburary 2, 2010)
    • (2007) 2007 Ridership by Subway Station
  • 3
    • 77955035233 scopus 로고    scopus 로고
    • New York City Subway Rolling Stock, (last accessed Feburary 2, 2010)
    • New York City Subway Rolling Stock, http://www.nycsubway.org/cars/index. html (last accessed Feburary 2, 2010)
  • 5
    • 78649306695 scopus 로고    scopus 로고
    • (last accessed Feburary 2, 2010)
    • Sinit P2P Trojan Analysis, http://www.lurhq.com/sinit.html (last accessed Feburary 2, 2010)
    • Sinit P2P Trojan Analysis
  • 8
    • 77955016995 scopus 로고    scopus 로고
    • F.-S. Corporation, (December), (last accessed Feburary 2, 2010)
    • F.-S. Corporation: F-Secure Computer Virus Descriptions: Cabir (December 2004), http://www.f-secure.com/v-descs/cabir.shtml (last accessed Feburary 2, 2010)
    • (2004) F-Secure Computer Virus Descriptions: Cabir
  • 9
    • 77955041981 scopus 로고    scopus 로고
    • F.-S. Corporation, (April), (last accessed Feburary 2, 2010)
    • F.-S. Corporation: F-Secure Computer Virus Descriptions: Mabir.A (April 2005), http://www.f-secure.com/v-descs/mabir.shtml (last accessed Feburary 2, 2010)
    • (2005) F-Secure Computer Virus Descriptions: Mabir.A
  • 13
    • 77955020077 scopus 로고    scopus 로고
    • (last accessed Feburary 2, 2010)
    • Eckman, B.: http://lists.sans.org/pipermail/unisog/2006-April/026261.html (last accessed Feburary 2, 2010)
    • Eckman, B.1
  • 16
    • 33646054897 scopus 로고    scopus 로고
    • Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
    • di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
    • Freiling, F.C., Holz, T., Wicherski, G.: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.3679, pp. 319-335. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3679 , pp. 319-335
    • Freiling, F.C.1    Holz, T.2    Wicherski, G.3
  • 17
    • 85075837457 scopus 로고    scopus 로고
    • Bot Miner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • San Jose CA (July)
    • Gu, G., Perdisci, R., Zhang, J., Lee,W.: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: Proceedings of the 17th USENIX Security Symposium (SECURITY), San Jose, CA (July 2008)
    • (2008) Proceedings of the 17th USENIX Security Symposium (SECURITY)
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 21
    • 77952374488 scopus 로고    scopus 로고
    • Security information: Virus encyclopedia: Symbos comwar.a: Technical details
    • Lactaotao, M.: Security Information: Virus Encyclopedia: Symbos comwar.a: Technical Details. Trend Micro Incorporated (2005)
    • (2005) Trend Micro Incorporated
    • Lactaotao, M.1
  • 23
    • 34547297951 scopus 로고    scopus 로고
    • Worm epidemics in wireless adhoc networks
    • Nekovee, M.: Worm Epidemics in Wireless Adhoc Networks. Journal of Physics 9, 189 (2007)
    • (2007) Journal of Physics , vol.9 , pp. 189
    • Nekovee, M.1
  • 32
    • 70449354248 scopus 로고    scopus 로고
    • Characterizing the limitations of third-party EAS over cellular text messaging services
    • Traynor, P.: Characterizing the Limitations of Third-Party EAS Over Cellular Text Messaging Services. 3G Americas Whitepaper (2008)
    • (2008) 3G Americas Whitepaper
    • Traynor, P.1
  • 35
    • 77955041635 scopus 로고    scopus 로고
    • (Last accessed February 2, 2010)
    • Vamosi, R.: Mobile phone malware in our future (2008), http://news.cnet.com/8301-10789-3-10071982-57.html (Last accessed February 2, 2010)
    • (2008) Mobile Phone Malware in Our Future
    • Vamosi, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.