메뉴 건너뛰기




Volumn , Issue , 2011, Pages 121-132

Detecting stealthy P2P botnets using statistical traffic fingerprints

Author keywords

Botnet; Intrusion Detection; P2P; Security

Indexed keywords

BOTNET; BOTNETS; CURRENT DETECTION; DETECTION ACCURACY; DETECTION SYSTEM; EXPERIMENTAL EVALUATION; FALSE POSITIVE RATES; MALICIOUS ACTIVITIES; P2P; P2P APPLICATIONS; P2P COMMUNICATIONS; PEER TO PEER; REAL WORLD DATA; SECURITY;

EID: 80051935855     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2011.5958212     Document Type: Conference Paper
Times cited : (89)

References (23)
  • 2
    • 80051924605 scopus 로고    scopus 로고
    • Autoit script. http://www.autoitscript.com/autoit3/index.shtml.
  • 3
    • 14344265818 scopus 로고    scopus 로고
    • Internet traffic classification using Bayesian analysis techniques
    • A.W. Moore and D. Zuev. Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS, 2005.
    • (2005) ACM SIGMETRICS
    • Moore, A.W.1    Zuev, D.2
  • 6
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proc. USENIX Security, 2008.
    • (2008) Proc. USENIX Security
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 8
    • 85084097128 scopus 로고    scopus 로고
    • Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
    • T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm. In Proc. USENIX LEET, 2008.
    • (2008) Proc. USENIX LEET
    • Holz, T.1    Steiner, M.2    Dahl, F.3    Biersack, E.4    Freiling, F.5
  • 9
    • 77952351261 scopus 로고    scopus 로고
    • Towards complete node enumeration in a peer-to-peer botnet
    • B. Kang, E. C. Tin, and C. P. Lee. Towards complete node enumeration in a peer-to-peer botnet. In Proc. ACM ASIACCS, 2009.
    • (2009) Proc. ACM ASIACCS
    • Kang, B.1    Tin, E.C.2    Lee, C.P.3
  • 11
    • 77953328281 scopus 로고    scopus 로고
    • Measurement and diagnosis of address misconfigured p2p traffic
    • Z. Li, A. Goyal, Y. Chen, and A. Kuzmanovic. Measurement and diagnosis of address misconfigured p2p traffic. In IEEE INFOCOM 2010, 2010.
    • (2010) IEEE INFOCOM 2010
    • Li, Z.1    Goyal, A.2    Chen, Y.3    Kuzmanovic, A.4
  • 12
    • 44449130555 scopus 로고    scopus 로고
    • Finding peer-to-peer file sharing using coarse network behaviors
    • M.P. Collins and M. K. Reiter. Finding peer-to-peer file sharing using coarse network behaviors. In Proc. ESORICS, 2006.
    • (2006) Proc. ESORICS
    • Collins, M.P.1    Reiter, M.K.2
  • 14
    • 80051932881 scopus 로고    scopus 로고
    • P. Porras, H. Saidi, and V. Yegneswaran. Conficker c analysis. http://mtc.sri.com/Conficker/addendumC/index.html, 2009.
    • (2009)
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 16
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, scalable in-network identication of p2p traffic using application signatures
    • S. Sen, O. Spatscheck, and D. Wang. Accurate, scalable in-network identication of p2p traffic using application signatures. In WWW, 2004.
    • (2004) WWW
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 18
    • 49049107082 scopus 로고    scopus 로고
    • Analysis of the storm and nugache trojans: P2p is here
    • S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the storm and nugache trojans: P2p is here. In USENIX; login, vol. 32, no. 6, 2007.
    • (2007) USENIX; Login , vol.32 , Issue.6
    • Stover, S.1    Dittrich, D.2    Hernandez, J.3    Dietrich, S.4
  • 19
    • 77955861102 scopus 로고    scopus 로고
    • Are your hosts trading or plotting? Telling p2p file-sharing and bots apart
    • T.-F. Yen and M. K. Reiter. Are your hosts trading or plotting? Telling p2p file-sharing and bots apart. In ICDCS, 2010.
    • (2010) ICDCS
    • Yen, T.-F.1    Reiter, M.K.2
  • 22
  • 23
    • 0030157145 scopus 로고    scopus 로고
    • Birch: An efficient data clustering method for very large databases
    • ACM Press
    • T. Zhang, R. Ramakrishnan, and M. Livny. Birch: An efficient data clustering method for very large databases. In Proc. ACM SIGMOD. ACM Press, 1996.
    • (1996) Proc. ACM SIGMOD.
    • Zhang, T.1    Ramakrishnan, R.2    Livny, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.