메뉴 건너뛰기




Volumn 6958 LNCS, Issue , 2011, Pages 299-313

Stegobot: A covert social network botnet

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; COVERT COMMUNICATIONS; DATA SETS; IMAGE SHARING; IMAGE STEGANOGRAPHY; MALWARE ATTACKS; NETWORK THROUGHPUT; ONLINE SOCIAL NETWORKS; OPTIMAL ROUTING; RESTRICTED FLOODING; SENSITIVE DATAS; SOCIAL NETWORKS; UNOBSERVABLE; USER INTERACTION; NETWORK OVERLAY; ON-LINE SOCIAL NETWORKS;

EID: 80052986561     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-24178-9_21     Document Type: Conference Paper
Times cited : (64)

References (29)
  • 1
    • 84886287589 scopus 로고    scopus 로고
    • Facebook, http://www.facebook.com
    • Facebook
  • 2
    • 80053011432 scopus 로고    scopus 로고
    • Flickr, http://www.flickr.com
    • Flickr
  • 3
    • 80053035905 scopus 로고    scopus 로고
    • JSteg, http://zooid.org/~paul/crypto/jsteg/
    • JSteg
  • 4
    • 80053050001 scopus 로고    scopus 로고
    • Koobface, http://en.wikipedia.org/wiki/Koobface
    • Koobface
  • 5
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Albert, R., Jeong, H., Barabasi, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378-382 (2000)
    • (2000) Nature , vol.406 , Issue.6794 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabasi, A.-L.3
  • 7
    • 30744445178 scopus 로고    scopus 로고
    • Perturbed quantization steganography
    • Fridrich, J.J., Goljan, M., Soukal, D.: Perturbed quantization steganography. Multimedia Syst. 11(2), 98-107 (2005)
    • (2005) Multimedia Syst. , vol.11 , Issue.2 , pp. 98-107
    • Fridrich, J.J.1    Goljan, M.2    Soukal, D.3
  • 9
    • 85093871360 scopus 로고    scopus 로고
    • Rishi: Identify bot contaminated hosts by IRC nickname evaluation
    • Goebel, J., Holz, T.: Rishi: Identify bot contaminated hosts by IRC nickname evaluation. In: HotBots (2007)
    • (2007) HotBots
    • Goebel, J.1    Holz, T.2
  • 11
    • 85093872656 scopus 로고    scopus 로고
    • Wide-scale botnet detection and characterization
    • Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: HotBots (2007)
    • (2007) HotBots
    • Karasaridis, A.1    Rexroad, B.2    Hoeflin, D.3
  • 12
    • 38149033612 scopus 로고    scopus 로고
    • Modified Matrix Encoding Technique for Minimal Distortion Steganography
    • Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. Springer, Heidelberg
    • Kim, Y., Duric, Z., Richards, D.: Modified Matrix Encoding Technique for Minimal Distortion Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314-327. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 13
    • 49949111194 scopus 로고    scopus 로고
    • Generalised category attack-improving histogram-based attack on JPEG LSB embedding
    • Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. Springer, Heidelberg
    • Lee, K., Westfeld, A.: Generalised category attack-improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 11-13. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4567 , pp. 11-13
    • Lee, K.1    Westfeld, A.2
  • 14
    • 38849120767 scopus 로고    scopus 로고
    • Category attack for lsb embedding of jpeg images
    • Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. Springer, Heidelberg
    • Lee, K., Westfeld, A., Lee, S.: Category attack for lsb embedding of jpeg images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 35-48. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4283 , pp. 35-48
    • Lee, K.1    Westfeld, A.2    Lee, S.3
  • 17
    • 77955020947 scopus 로고    scopus 로고
    • Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
    • Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. Springer, Heidelberg
    • Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M., Cavallaro, L.: Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 81-100. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6201 , pp. 81-100
    • Nappa, A.1    Fattori, A.2    Balduzzi, M.3    Dell'Amico, M.4    Cavallaro, L.5
  • 18
    • 35248875661 scopus 로고    scopus 로고
    • A steganographic embedding undetectable by JPEG compatibility steganalysis
    • Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
    • Newman, Moskowitz, Chang, Brahmadesam: A steganographic embedding undetectable by JPEG compatibility steganalysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 258-277. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2578 , pp. 258-277
    • Newman1    Moskowitz2    Chang3    Brahmadesam4
  • 21
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography
    • Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security and Privacy 1, 32-44 (2003)
    • (2003) IEEE Security and Privacy , vol.1 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 22
    • 35048819204 scopus 로고    scopus 로고
    • Model-based steganography
    • Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. Springer, Heidelberg
    • Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154-167. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 23
    • 49949091527 scopus 로고    scopus 로고
    • YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
    • Furon, T., Cayre, F., Doërr, G.J., Bas, P. (eds.) IH 2007. Springer, Heidelberg
    • Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In: Furon, T., Cayre, F., Doërr, G.J., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16-31. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4567 , pp. 16-31
    • Solanki, K.1    Sarkar, A.2    Manjunath, B.S.3
  • 24
    • 78649828992 scopus 로고    scopus 로고
    • Provably secure steganography: Achieving zero k-l divergence using statistical restoration
    • Solanki, K., Sullivan, K., Madhow, U., Manjunath, B., Chandrasekaran, S.: Provably secure steganography: Achieving zero k-l divergence using statistical restoration. In: ICIP (2006)
    • (2006) ICIP
    • Solanki, K.1    Sullivan, K.2    Madhow, U.3    Manjunath, B.4    Chandrasekaran, S.5
  • 25
    • 49049107082 scopus 로고    scopus 로고
    • Analysis of the Storm and Nugache trojans: P2P is here
    • December
    • Stover, S., Dittrich, D., Hernandez, J., Dietrich, S.: Analysis of the Storm and Nugache trojans: P2P is here. Login 32(6) (December 2007)
    • (2007) Login , vol.32 , Issue.6
    • Stover, S.1    Dittrich, D.2    Hernandez, J.3    Dietrich, S.4
  • 26
    • 84937814312 scopus 로고    scopus 로고
    • F5-A steganographic algorithm: High capacity despite better steganalysis
    • Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
    • Westfeld, A.: F5-A steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 27
    • 84892764719 scopus 로고    scopus 로고
    • Attacks on steganographic systems
    • Pfitzmann, A. (ed.) IH 1999. Springer, Heidelberg
    • Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61-75. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1768 , pp. 61-75
    • Westfeld, A.1    Pfitzmann, A.2
  • 28
    • 49949094072 scopus 로고    scopus 로고
    • Traffic aggregation for malware detection
    • Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
    • Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 207-227. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 207-227
    • Yen, T.-F.1    Reiter, M.K.2
  • 29
    • 10044282531 scopus 로고    scopus 로고
    • On estimation of secret message length in jsteg-like steganography
    • Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in jsteg-like steganography. In: International Conference on Pattern Recognition, vol. 4, pp. 673-676 (2004)
    • (2004) International Conference on Pattern Recognition , vol.4 , pp. 673-676
    • Yu, X.1    Wang, Y.2    Tan, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.