메뉴 건너뛰기




Volumn 6369 LNCS, Issue , 2010, Pages 57-67

Mobile Botnet detection using network forensics

Author keywords

Botnet; computational intelligence; malware; mobile; network forensics

Indexed keywords

BOTNET; COMPUTATIONAL INTELLIGENCE; MALWARES; MOBILE; NETWORK FORENSICS;

EID: 78049364023     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15877-3_7     Document Type: Conference Paper
Times cited : (28)

References (25)
  • 1
    • 78049393537 scopus 로고    scopus 로고
    • Internet Service Providers' Association, 'What is Spam?', April
    • Internet Service Providers' Association, 'What is Spam?' (2008), http://www.ispa.org.za/spam/whatisspam.shtml (April 2009)
    • (2008)
  • 3
    • 78049396044 scopus 로고    scopus 로고
    • Security vision from mcFee avert labs
    • Security Vision from McFee Avert Labs, The Future of Security (2007)
    • (2007) The Future of Security
  • 4
    • 78049398258 scopus 로고    scopus 로고
    • McFee
    • McFee (2010), http://vil.mcafeesecurity.com/vil/content/v-138726.htm
    • (2010)
  • 6
    • 78049383414 scopus 로고    scopus 로고
    • Economist "Big brother bosses", September 11, September 2009
    • The Economist "Big brother bosses" (September 11, 2009), http://www.economist.com/businessfinance/displaystory.cfm?story-id=14413380 (September 2009)
    • (2009)
  • 7
    • 33750942717 scopus 로고    scopus 로고
    • 3G mobile networks
    • limited edn. Tata MCGraw-Hill Publishing Company, New York
    • Kasera, S., Narang, N.: 3G Mobile Networks. Architecture, Protocols and Procedure, limited edn. Tata MCGraw-Hill Publishing Company, New York (2005)
    • (2005) Architecture, Protocols and Procedure
    • Kasera, S.1    Narang, N.2
  • 8
    • 0032124041 scopus 로고    scopus 로고
    • Mobility and security management in the gsm system and some proposed future improvements
    • Mehrotra, A., Golding, L. S.: Mobility and security management in the gsm system and some proposed future improvements. Proceedings of the IEEE 86(7), 1480-1497 (1998)
    • (1998) Proceedings of the IEEE , vol.86 , Issue.7 , pp. 1480-1497
    • Mehrotra, A.1    Golding, L.S.2
  • 12
    • 78049389884 scopus 로고    scopus 로고
    • Information Security Magazine, "Network Security", September
    • Information Security Magazine, "Network Security", http://searchsecurity.techtarget.com/sDefinition/0sid-gci859579.00.html (September 2009)
    • (2009)
  • 13
    • 1542492748 scopus 로고    scopus 로고
    • Identifying significant features for network forensic analysis using artificial intelligent techniques
    • Mukkamala, S., Sung, A. H.: Identifying significant features for network forensic analysis using artificial intelligent techniques. Int'l Journal of Digital Evidence 1(4), 1-7 (2003)
    • (2003) Int'l Journal of Digital Evidence , vol.1 , Issue.4 , pp. 1-7
    • Mukkamala, S.1    Sung, A.H.2
  • 14
    • 78049408526 scopus 로고    scopus 로고
    • Web Security, Privacy & Commerce, 2nd edn
    • Garfinkel, S.: Web Security, Privacy & Commerce, 2nd edn, http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html
    • Garfinkel, S.1
  • 20
    • 84867739760 scopus 로고    scopus 로고
    • A fuzzy approach for detecting anomalous behaviour in e-mail traffic
    • Valli, C., Woodward, A. eds., School of Computer and Information Science, Edith Cowan University, Perth
    • Lim, M. J.-H., Negnevitsky, M., Hartnett, J.: A fuzzy approach for detecting anomalous behaviour in e-mail traffic. In: Valli, C., Woodward, A. (eds.) 4th Australian Digital Forensics Conference, pp. 36-49. School of Computer and Information Science, Edith Cowan University, Perth (2006)
    • (2006) 4th Australian Digital Forensics Conference , pp. 36-49
    • Lim, M.J.-H.1    Negnevitsky, M.2    Hartnett, J.3
  • 24
    • 26444432363 scopus 로고    scopus 로고
    • Fuzzy logic-based diagnosis of traffic anomalies in voice networks
    • Butto, M., Naldi, M., Neri, A.: Fuzzy logic-based diagnosis of traffic anomalies in voice networks. Journal of Network and Systems Management 9(2), 161-182 (2001)
    • (2001) Journal of Network and Systems Management , vol.9 , Issue.2 , pp. 161-182
    • Butto, M.1    Naldi, M.2    Neri, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.