메뉴 건너뛰기




Volumn 6123 LNCS, Issue , 2010, Pages 511-528

Social network-based botnet command-and-control: Emerging threats and countermeasures

Author keywords

Botnet; Command and control; Security; Social networks

Indexed keywords

BOTNET; BOTNETS; C METHOD; COMMAND-AND-CONTROL; CURRENT GENERATION; CYBERSPACES; NETWORK-BASED; SECURITY; SOCIAL NETWORKING; SOCIAL NETWORKS;

EID: 79956295945     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13708-2_30     Document Type: Conference Paper
Times cited : (74)

References (37)
  • 1
    • 56649085023 scopus 로고    scopus 로고
    • Antisocial networks: Turning a social network into a botnet
    • Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
    • Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K., Markatos, E.: Antisocial networks: Turning a social network into a botnet. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 146-160. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5222 , pp. 146-160
    • Athanasopoulos, E.1    Makridakis, A.2    Antonatos, S.3    Antoniades, D.4    Ioannidis, S.5    Anagnostakis, K.6    Markatos, E.7
  • 6
    • 38149070087 scopus 로고    scopus 로고
    • Hit-list worm detection and bot identification in large networks using protocol graphs
    • Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
    • Collins, M., Reiter, M.: Hit-list worm detection and bot identification in large networks using protocol graphs. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 276-295. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4637 , pp. 276-295
    • Collins, M.1    Reiter, M.2
  • 8
    • 84888402098 scopus 로고    scopus 로고
    • The zombie roundup: Understanding, detecting, and disrupting botnets
    • Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: understanding, detecting, and disrupting botnets. In: Proc. SRUTI '05 (2005)
    • (2005) Proc. SRUTI '05
    • Cooke, E.1    Jahanian, F.2    McPherson, D.3
  • 9
    • 79956311697 scopus 로고    scopus 로고
    • Microsoft Corporation. Network monitor 3.3, http://go.microsoft.com/ fwlink/?LinkID=103158&clcid=0x409
    • Network Monitor 3.3
  • 11
    • 79956298054 scopus 로고    scopus 로고
    • A taxonomy of botnet structures
    • Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007, Springer, Heidelberg
    • Dagon, D., Gu, G., Lee, C., Lee, W.: A taxonomy of botnet structures. In: Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. LNCS, vol. 4697, Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4697
    • Dagon, D.1    Gu, G.2    Lee, C.3    Lee, W.4
  • 14
    • 85093871360 scopus 로고    scopus 로고
    • Rishi: Identify bot contaminated hosts by irc nickname evaluation
    • Goebel, J., Holz, T.: Rishi: identify bot contaminated hosts by irc nickname evaluation. In: Proc. HotBots '07 (2007)
    • (2007) Proc. HotBots '07
    • Goebel, J.1    Holz, T.2
  • 16
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Security '08 (2008)
    • (2008) Security '08
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 17
    • 85061529860 scopus 로고    scopus 로고
    • BotHunter: Detecting malware infection through ids-driven dialog correlation
    • Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting malware infection through ids-driven dialog correlation. In: USENIX Security '07 (2007)
    • (2007) USENIX Security '07
    • Gu, G.1    Porras, P.2    Yegneswaran, V.3    Fong, M.4    Lee, W.5
  • 18
    • 85175133385 scopus 로고    scopus 로고
    • BotSniffer: Detecting botnet command and control channels in network traffic
    • Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting botnet command and control channels in network traffic. In: Proc. NDSS '08 (2008)
    • (2008) Proc. NDSS '08
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 19
    • 85084097128 scopus 로고    scopus 로고
    • Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
    • Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: LEET '08 (2008)
    • (2008) LEET '08
    • Holz, T.1    Steiner, M.2    Dahl, F.3    Biersack, E.4    Freiling, F.5
  • 20
    • 84908346958 scopus 로고    scopus 로고
    • Rb-seeker: Auto-detection of redirection botnets
    • Hu, X., Knysz, M., Shin, K.G.: Rb-seeker: Auto-detection of redirection botnets. In: Proc. NDSS '09 (2009)
    • (2009) Proc. NDSS '09
    • Hu, X.1    Knysz, M.2    Shin, K.G.3
  • 21
    • 79960808450 scopus 로고    scopus 로고
    • Technical report, Finjan Software Inc.
    • Finjan Software Inc. Web security trends report q4 2007. Technical report, Finjan Software Inc. (2007), http://www.finjan.com/Content.aspx?id=827
    • (2007) Web Security Trends Report q4 2007
  • 26
    • 58149161861 scopus 로고    scopus 로고
    • As the net churns: Fast-flux botnet observations
    • Nazario, J., Holz, T.: As the net churns: Fast-flux botnet observations. In: Proc. MALWARE '08 (2008)
    • (2008) Proc. MALWARE '08
    • Nazario, J.1    Holz, T.2
  • 29
  • 30
    • 79956314807 scopus 로고    scopus 로고
    • Evaluating email's feasibility for botnet command and control
    • Singh, K., Srivastava, A., Giffin, J., Lee, W.: Evaluating email's feasibility for botnet command and control. In: Proc. DSN
    • Proc. DSN
    • Singh, K.1    Srivastava, A.2    Giffin, J.3    Lee, W.4
  • 31
    • 37849037807 scopus 로고    scopus 로고
    • Characterizing bots' remote control behavior
    • Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. Springer, Heidelberg
    • Stinson, E., Mitchell, J.C.: Characterizing bots' remote control behavior. In: Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 89-108. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4579 , pp. 89-108
    • Stinson, E.1    Mitchell, J.C.2
  • 36
    • 79957654482 scopus 로고    scopus 로고
    • Using failure information analysis to detect enterprise zombies
    • Zhu, Z., Yegneswaran, V., Chen, Y.: Using failure information analysis to detect enterprise zombies. In: Proc. Securecomm '09 (2009)
    • (2009) Proc. Securecomm '09
    • Zhu, Z.1    Yegneswaran, V.2    Chen, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.