메뉴 건너뛰기




Volumn 2, Issue , 2010, Pages 158-162

A taxonomy of Botnet detection techniques

Author keywords

Bot; Botnet; Malicious activities; P2P; Patterns

Indexed keywords

BOT; BOTNET; MALICIOUS ACTIVITIES; P2P; PATTERNS;

EID: 77958527473     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSIT.2010.5563555     Document Type: Conference Paper
Times cited : (78)

References (28)
  • 1
    • 57149085446 scopus 로고    scopus 로고
    • An inside look at botnets
    • Advances in Information Security, Springer, Heidelberg
    • P. Barford and V.Yagneswaran, "An Inside Look at Botnets". In: Special Workshop on Malware Detection, Advances in Information Security, Springer, Heidelberg (2006).
    • (2006) Special Workshop on Malware Detection
    • Barford, P.1    Yagneswaran, V.2
  • 5
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers, " in Proc. ACM SIGCOMM, 2006.
    • (2006) Proc. ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 6
    • 70449508100 scopus 로고    scopus 로고
    • Zombies and botnets
    • Australian Institute of Criminology, Canberra, March
    • K. K. R. Choo, "Zombies and Botnets, " Trends and issues in crime and criminal justice, no. 333, Australian Institute of Criminology, Canberra, March 2007.
    • (2007) Trends and Issues in Crime and Criminal Justice , Issue.333
    • Choo, K.K.R.1
  • 8
    • 33646054897 scopus 로고    scopus 로고
    • Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
    • vol. Lecture Notes in Computer Science 3676, September
    • F. Freiling, T. Holz, and G. Wicherski, "Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks, " in Proc. 10th European Symposium on Research in Computer Security (ESORICS), vol. Lecture Notes in Computer Science 3676, September 2005, pp. 319-335.
    • (2005) Proc. 10th European Symposium on Research in Computer Security (ESORICS) , pp. 319-335
    • Freiling, F.1    Holz, T.2    Wicherski, G.3
  • 11
    • 77958582326 scopus 로고    scopus 로고
    • web page, March
    • Snort IDS web page, http://www.snort.org March 2006.
    • (2006) Snort IDS
  • 12
    • 85093871360 scopus 로고    scopus 로고
    • Rishi: Identify bot contaminated hosts by ire nickname evaluation
    • J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by ire nickname evaluation. In Proceedings of USENIX HotBots'07, 2007.
    • (2007) Proceedings of USENIX HotBots'07
    • Goebel, J.1    Holz, T.2
  • 15
    • 85080378133 scopus 로고    scopus 로고
    • An algorithm for anomaly-based Botnet detection
    • July
    • R. Binkley and S. Singh. An algorithm for anomaly-based Botnet detection. In Proceedings of USENIX SRLTCT06, pages 43-48, July 2006.
    • (2006) Proceedings of USENIX SRLTCT06 , pp. 43-48
    • Binkley, R.1    Singh, S.2
  • 19
    • 51949119334 scopus 로고    scopus 로고
    • Botnet detection and response, the network is the infection
    • D. Dagon, "Botnet Detection and Response, The Network is the Infection, " in OARC Workshop, 2005.
    • (2005) OARC Workshop
    • Dagon, D.1
  • 23
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol- and structure independent Botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering analysis of network traffic for protocol- and structure independent Botnet detection, " in Proc. 17th USENIX Security Symposium, 2008.
    • (2008) Proc. 17th USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.