메뉴 건너뛰기




Volumn , Issue , 2010, Pages 48-61

Detecting algorithmically generated malicious domain names

Author keywords

Components; Domain flux; Domain names; Edit distance; Entropy; IP Fast Flux; Jaccard Index; Malicious

Indexed keywords

ENTROPY; INTERNET PROTOCOLS;

EID: 78650869579     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1879141.1879148     Document Type: Conference Paper
Times cited : (323)

References (34)
  • 1
    • 85167540550 scopus 로고    scopus 로고
    • Botlab. http://botlab.cs.washington.edu/.
  • 8
    • 85167539404 scopus 로고    scopus 로고
    • Win32/hamewq. http: //www.microsoft.com/security/portal/Threat/ Encyclopedia/Entry.aspx?Name=Win32/Hamweq.
  • 9
    • 84867757379 scopus 로고    scopus 로고
    • Yahoo webspam database. http://barcelona.research.yahoo.net/webspam/ datasets/uk2007/.
    • Yahoo Webspam Database
  • 12
    • 55649124625 scopus 로고    scopus 로고
    • Kwyjibo: Automatic domain name generation
    • John Wiley & Sons, Ltd.
    • H. Crawford and J. Aycock. Kwyjibo: Automatic Domain Name Generation. In Software Practice and Experience, John Wiley & Sons, Ltd., 2008.
    • (2008) Software Practice and Experience
    • Crawford, H.1    Aycock, J.2
  • 17
    • 84875641129 scopus 로고    scopus 로고
    • Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
    • July
    • S. S. J. Ma, L.K. Saul and G. Voelker. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs. Proc. of ACM KDD, July 2009.
    • (2009) Proc. of ACM KDD
    • Ma, S.S.J.1    Saul, L.K.2    Voelker, G.3
  • 27
    • 67650803219 scopus 로고    scopus 로고
    • An analysis of conficker's logic and rendezvous points
    • mar
    • P. Porras, H. Saidi, and V. Yegneswaran. An Analysis of Conficker's Logic and Rendezvous Points. Technical report, mar 2009.
    • (2009) Technical Report
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 29
    • 80052735307 scopus 로고    scopus 로고
    • Inside the storm: Protocols and encryption of the storm botnet
    • USA
    • J. Stewart. Inside the Storm: Protocols and Encryption of the Storm Botnet. Black Hat Technical Security Conference, USA, 2008.
    • (2008) Black Hat Technical Security Conference
    • Stewart, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.