메뉴 건너뛰기




Volumn , Issue , 2011, Pages 124-134

Boosting the scalability of botnet detection using adaptive traffic sampling

Author keywords

Adaptive sampling; Botnet; Intrusion detection; Network security

Indexed keywords

BOTNET; HEALTH RISKS; HIGH SPEED NETWORKS; NETWORK SECURITY; SCALABILITY;

EID: 79956014847     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1966913.1966930     Document Type: Conference Paper
Times cited : (30)

References (24)
  • 1
    • 33845633068 scopus 로고    scopus 로고
    • Sketch guided sampling - Using on-line estimates of ow size for adaptive data collection
    • A. Kumar and J. Xu. Sketch guided sampling - using on-line estimates of ow size for adaptive data collection. In Proc. IEEE Infocom, 2006.
    • (2006) Proc. IEEE Infocom
    • Kumar, A.1    Xu, J.2
  • 3
    • 4444311813 scopus 로고    scopus 로고
    • Divide and concatenate: An architectural level optimization technique for universal hash functions
    • R. K. B. Yang and D.A.McGrew. Divide and concatenate: An architectural level optimization technique for universal hash functions. In Proc. of the Design Automation Conference, 2004.
    • (2004) Proc. of the Design Automation Conference
    • Yang, R.K.B.1    McGrew, D.A.2
  • 4
    • 85080378133 scopus 로고    scopus 로고
    • An algorithm for anomaly-based botnet detection
    • J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection. In Proc. USENIX SRUTI, 2006.
    • (2006) Proc. USENIX SRUTI
    • Binkley, J.R.1    Singh, S.2
  • 5
    • 85175133385 scopus 로고    scopus 로고
    • Botsniffer: Detecting botnet command and control channels in network traffic
    • G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In Proc. NDSS, 2008.
    • (2008) Proc. NDSS
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 7
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proc. USENIX Security, 2008.
    • (2008) Proc. USENIX Security
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 8
    • 57849085977 scopus 로고    scopus 로고
    • Rishi: Identify bot contaminated hosts by irc nickname evaluation
    • J. Goebel and T. Holz. Rishi: identify bot contaminated hosts by irc nickname evaluation. In Proc. USENIX HotBots, 2007.
    • (2007) Proc. USENIX HotBots
    • Goebel, J.1    Holz, T.2
  • 9
    • 51349163638 scopus 로고    scopus 로고
    • Accurate and efficient traffic monitoring using adaptive non-linear sampling method
    • C. Hu, S. Wang, J. Tian, B. Liu, Y. Cheng, and Y. Chen. Accurate and efficient traffic monitoring using adaptive non-linear sampling method. In Proc. IEEE Infocom, 2008.
    • (2008) Proc. IEEE Infocom
    • Hu, C.1    Wang, S.2    Tian, J.3    Liu, B.4    Cheng, Y.5    Chen, Y.6
  • 11
    • 77952351261 scopus 로고    scopus 로고
    • Towards complete node enumeration in a peer-to-peer botnet
    • B. Kang, E. C. Tin, and C. P. Lee. Towards complete node enumeration in a peer-to-peer botnet. In Proc. ACM AISACCS, 2009.
    • (2009) Proc. ACM AISACCS
    • Kang, B.1    Tin, E.C.2    Lee, C.P.3
  • 18
    • 77955861102 scopus 로고    scopus 로고
    • Are your hosts trading or plotting? telling p2p file-sharing and bots apart
    • T.-F. Yen and M. K. Reiter. Are your hosts trading or plotting? telling p2p file-sharing and bots apart. In ICDCS, 2010.
    • (2010) ICDCS
    • Yen, T.-F.1    Reiter, M.K.2
  • 20
    • 84908346958 scopus 로고    scopus 로고
    • Rb-seeker: Auto-detection of redirection botnets
    • X. Hu, M. Knysz and K. Shin. Rb-seeker: Auto-detection of redirection botnets. In Proc. NDSS, 2009.
    • (2009) Proc. NDSS
    • Hu, X.1    Knysz, M.2    Shin, K.3
  • 21
    • 14944356227 scopus 로고    scopus 로고
    • Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
    • Y. Zhang, S. Singh, S. Sen, N. Duffield and C. Lund. Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications. In Proc. ACM IMC, 2004.
    • (2004) Proc. ACM IMC
    • Zhang, Y.1    Singh, S.2    Sen, S.3    Duffield, N.4    Lund, C.5
  • 22
  • 23
    • 58449108281 scopus 로고    scopus 로고
    • Traffic aggregation for malware detection
    • T.-F. Yen and M. K. Reiter. Traffic aggregation for malware detection. In Proc. DIMVA, 2008.
    • (2008) Proc. DIMVA
    • Yen, T.-F.1    Reiter, M.K.2
  • 24
    • 0030157145 scopus 로고    scopus 로고
    • Birch: An efficient data clustering method for very large databases
    • ACM Press
    • T. Zhang, R. Ramakrishnan, and M. Livny. Birch: An efficient data clustering method for very large databases. In Proc. ACM SIGMOD. ACM Press, 1996.
    • (1996) Proc. ACM SIGMOD
    • Zhang, T.1    Ramakrishnan, R.2    Livny, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.