메뉴 건너뛰기




Volumn 19, Issue 5, 2011, Pages 1557-1571

Humans and bots in internet chat: Measurement, analysis, and automated classification

Author keywords

Bots; classification; Internet chat; measurement

Indexed keywords

AUTOMATED CLASSIFICATION; BOT DETECTIONS; BOTS; CLASSIFICATION SYSTEM; EXPERIMENTAL EVALUATION; HUMAN BEHAVIORS; HUMAN USERS; INTERNET CHAT; INTERNET USERS; MALWARES; MEASUREMENT STUDY; TWO-COMPONENT;

EID: 80054091651     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2011.2126591     Document Type: Article
Times cited : (48)

References (43)
  • 2
    • 80054110172 scopus 로고    scopus 로고
    • AOL spam petitions cut both ways
    • Dec. 22 [Online]
    • J. Hu, "AOL spam petitions cut both ways," CNET News Dec. 22, 2010 [Online]. Available: http://news.cnet.com/AOL-spam-petitionscut-both-ways/ 2100-1024-3-1015385.html
    • (2010) CNET News
    • Hu, J.1
  • 3
    • 79952690149 scopus 로고    scopus 로고
    • Yahoo! Messenger network overrun by bots
    • Dec. 18 [Online]
    • B. Krebs, "Yahoo! Messenger network overrun by bots," Washington Post Dec. 18, 2007 [Online]. Available: http://blog.washingtonpost. com/securityfix/2007/08/yahoo-messenger-network-overru.html
    • (2007) Washington Post
    • Krebs, B.1
  • 4
    • 80054118569 scopus 로고    scopus 로고
    • Yahoo Chat: CAPTCHA check to remove bots
    • Dec. 18 [Online]
    • A. Mohta, "Yahoo Chat: CAPTCHA check to remove bots," Technospot.Net Dec. 18, 2007 [Online]. Available: http://www. technospot.net/blogs/yahoo-chat-captcha-check-to-remove-bots/
    • (2007) Technospot.Net
    • Mohta, A.1
  • 5
    • 80054111206 scopus 로고    scopus 로고
    • Bots are back in Yahoo chat rooms
    • Dec. 18 [Online]
    • A. Mohta, "Bots are back in Yahoo chat rooms," Technospot.Net Dec. 18, 2007 [Online]. Available: http://www.technospot.net/blogs/botsare-back- in-yahoo-chat-room/
    • (2007) Technospot.Net
    • Mohta, A.1
  • 6
    • 80054118362 scopus 로고    scopus 로고
    • Should cyberspace chat rooms be closed to protect children?
    • V. Hinze-Hoare, "Should cyberspace chat rooms be closed to protect children?," Comput. Res. Repository, 2004.
    • (2004) Comput. Res. Repository
    • Hinze-Hoare, V.1
  • 7
    • 67650851265 scopus 로고    scopus 로고
    • Reducing the attack surface in massively multiplayer online role-playing games
    • May-Jun.
    • S. Bono, D. Caselden, G. Landau, and C. Miller, "Reducing the attack surface in massively multiplayer online role-playing games," IEEE Security Privacy, vol. 7, no. 3, pp. 13-19, May-Jun. 2009.
    • (2009) IEEE Security Privacy , vol.7 , Issue.3 , pp. 13-19
    • Bono, S.1    Caselden, D.2    Landau, G.3    Miller, C.4
  • 8
    • 80054104718 scopus 로고    scopus 로고
    • Yahelite.org Jan. 8 [Online]
    • "YahElite chat client," Yahelite.org, Jan. 8, 2008 [Online]. Available: http://www.yahelite.org/
    • (2008) YahElite Chat Client
  • 9
    • 35248831179 scopus 로고    scopus 로고
    • CAPTCHA: Using hard AI problems for security
    • Warsaw, Poland, May
    • L. V. Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security," in Proc. Eurocrypt, Warsaw, Poland, May 2003, pp. 294-311.
    • (2003) Proc. Eurocrypt , pp. 294-311
    • Ahn, L.V.1    Blum, M.2    Hopper, N.3    Langford, J.4
  • 10
    • 33747653575 scopus 로고    scopus 로고
    • A study of internet instant messaging and chat protocols
    • DOI 10.1109/MNET.2006.1668399
    • R. B. Jennings, III, E. M. Nahum, D. P. Olshefski, D. Saha, Z.-Y. Shae, and C. Waters, "A study of internet instant messaging and chat protocols," IEEE Netw., vol. 20, no. 4, pp. 16-21, Jul.-Aug. 2006. (Pubitemid 44270226)
    • (2006) IEEE Network , vol.20 , Issue.4 , pp. 16-21
    • Jennings III, R.B.1    Nahum, E.M.2    Olshefski, D.P.3    Saha, D.4    Shae, Z.-Y.5    Waters, C.6
  • 11
    • 80054111389 scopus 로고    scopus 로고
    • Yahoo closes chat rooms over child sex concerns
    • Jan. 27 [Online]
    • E. Mills, "Yahoo closes chat rooms over child sex concerns," CNET News Jan. 27, 2008 [Online]. Available: http://news.cnet.com/2100-1025-3- 5759705.html
    • (2008) CNET News
    • Mills, E.1
  • 14
    • 48649108112 scopus 로고    scopus 로고
    • HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks
    • Miami Beach, FL, Dec.
    • M. Xie, Z. Wu, and H. Wang, "HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks," in Proc. ACSAC, Miami Beach, FL, Dec. 2007, pp. 64-73.
    • (2007) Proc. ACSAC , pp. 64-73
    • Xie, M.1    Wu, Z.2    Wang, H.3
  • 15
    • 48649093663 scopus 로고    scopus 로고
    • Analyzing network and content characteristics of spim using honeypots
    • Santa Clara, CA, Jun.
    • A. J. Trivedi, P. Q. Judge, and S. Krasser, "Analyzing network and content characteristics of spim using honeypots," presented at the USENIX SRUTI, Santa Clara, CA, Jun. 2007.
    • (2007) Usenix Shruti
    • Trivedi, A.J.1    Judge, P.Q.2    Krasser, S.3
  • 16
  • 17
    • 57849085977 scopus 로고    scopus 로고
    • Rishi: Identify bot contaminated hosts by IRC nickname evaluation
    • Cambridge, MA, Apr.
    • J. Goebel and T. Holz, "Rishi: Identify bot contaminated hosts by IRC nickname evaluation," presented at the USENIX HotBots, Cambridge, MA, Apr. 2007.
    • (2007) USENIX HotBots
    • Goebel, J.1    Holz, T.2
  • 18
    • 48649089769 scopus 로고    scopus 로고
    • A taxonomy of botnet structures
    • Miami, FL, Dec.
    • D. Dagon, G. Gu, C. P. Lee, and W. Lee, "A taxonomy of botnet structures," in Proc. ACSAC, Miami, FL, Dec. 2007, pp. 325-339.
    • (2007) Proc. ACSAC , pp. 325-339
    • Dagon, D.1    Gu, G.2    Lee, C.P.3    Lee, W.4
  • 19
    • 85061529860 scopus 로고    scopus 로고
    • Bothunter: Detecting malware infection through IDS-driven dialog correlation
    • Boston, MA, Aug.
    • G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "Bothunter: Detecting malware infection through IDS-driven dialog correlation," in Proc. USENIX Security, Boston, MA, Aug. 2007, pp. 167-182.
    • (2007) Proc. USENIX Security , pp. 167-182
    • Gu, G.1    Porras, P.2    Yegneswaran, V.3    Fong, M.4    Lee, W.5
  • 20
    • 85175133385 scopus 로고    scopus 로고
    • Botsniffer: Detecting botnet command and control channels in network traffic
    • San Diego, CA, Feb.
    • G. Gu, J. Zhang, and W. Lee, "Botsniffer: Detecting botnet command and control channels in network traffic," presented at the NDSS, San Diego, CA, Feb. 2008.
    • (2008) NDSS
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 21
    • 48649084321 scopus 로고    scopus 로고
    • Botnet tracking: Tools, techniques, and lessons learned
    • Washington, DC, Feb.-Mar.
    • J. Nazario, "Botnet tracking: Tools, techniques, and lessons learned," presented at the BlackHat, Washington, DC, Feb.-Mar. 2007.
    • (2007) BlackHat
    • Nazario, J.1
  • 24
    • 11244335124 scopus 로고    scopus 로고
    • Sparse binary polynomial hashing and the CRM114 discriminator
    • Cambridge, MA, Jan.
    • W. Yerazunis, "Sparse binary polynomial hashing and the CRM114 discriminator," presented at the MIT Spam Conf., Cambridge, MA, Jan. 2003.
    • (2003) MIT Spam Conf.
    • Yerazunis, W.1
  • 25
    • 79952052472 scopus 로고    scopus 로고
    • Scalable centralized Bayesian spam mitigation with bogofilter
    • Atlanta, GA, Nov.
    • J. Blosser and D. Josephsen, "Scalable centralized Bayesian spam mitigation with bogofilter," in Proc. USENIX LISA, Atlanta, GA, Nov. 2004, pp. 1-20.
    • (2004) Proc. USENIX LISA , pp. 1-20
    • Blosser, J.1    Josephsen, D.2
  • 27
    • 33750374263 scopus 로고    scopus 로고
    • Fast statistical spam filter by approximate classifications
    • DOI 10.1145/1140103.1140317, SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings
    • K. Li and Z. Zhong, "Fast statistical spam filter by approximate classifications," in Proc. ACM SIGMETRICS, St. Malo, France, Jun. 2006, pp. 347-358. (Pubitemid 44619104)
    • (2006) Performance Evaluation Review , vol.34 , Issue.1 , pp. 347-358
    • Li, K.1    Zhong, Z.2
  • 28
    • 33947663308 scopus 로고    scopus 로고
    • On attacking statistical spam filters
    • CA, Jul.
    • G. L. Wittel and S. F. Wu, "On attacking statistical spam filters," presented at the CEAS, Mountain View, CA, Jul. 2004.
    • (2004) CEAS Mountain View
    • Wittel, G.L.1    Wu, S.F.2
  • 29
    • 65449142381 scopus 로고    scopus 로고
    • Good word attacks on statistical spam filters
    • CA, Jul.
    • D. Lowd and C. Meek, "Good word attacks on statistical spam filters," presented at the CEAS, Mountain View, CA, Jul. 2005.
    • (2005) CEAS Mountain View
    • Lowd, D.1    Meek, C.2
  • 30
    • 85084161850 scopus 로고    scopus 로고
    • Exploiting redundancy in natural language to penetrate Bayesian spam filters
    • Boston, MA, Aug.
    • C. Karlberger, G. Bayler, C. Kruegel, and E. Kirda, "Exploiting redundancy in natural language to penetrate Bayesian spam filters," presented at the USENIX WOOT, Boston, MA, Aug. 2007.
    • (2007) USENIX WOOT
    • Karlberger, C.1    Bayler, G.2    Kruegel, C.3    Kirda, E.4
  • 31
    • 80054098856 scopus 로고    scopus 로고
    • New entry process for chat rooms
    • Aug. 29 [Online]
    • S. Bacon, "New entry process for chat rooms," Yahoo! Messenger Blog Aug. 29, 2007 [Online]. Available: http://www.ymessengerblog.com/blog/2007/ 08/29/new-entry-process-for-chat-rooms/
    • (2007) Yahoo! Messenger Blog
    • Bacon, S.1
  • 32
    • 80054121657 scopus 로고    scopus 로고
    • Chat rooms follow-up
    • Aug. 21 [Online]
    • S. Bacon, "Chat rooms follow-up," Yahoo! Messenger Blog Aug. 21, 2007 [Online]. Available: http://www.ymessengerblog.com/blog/2007/08/21/ chat-rooms-follow-up/
    • (2007) Yahoo! Messenger Blog
    • Bacon, S.1
  • 33
    • 80054113867 scopus 로고    scopus 로고
    • Chat rooms update
    • Aug. 24 [Online]
    • S. Bacon, "Chat rooms update," Yahoo! Messenger Blog Aug. 24, 2007 [Online]. Available: http://www.ymessengerblog.com/blog/2007/08/24/chat- rooms-update-2/
    • (2007) Yahoo! Messenger Blog
    • Bacon, S.1
  • 34
    • 0002988210 scopus 로고
    • Computing machinery and intelligence
    • A. M. Turing, "Computing machinery and intelligence," Mind, vol. 59, pp. 433-460, 1950.
    • (1950) Mind , vol.59 , pp. 433-460
    • Turing, A.M.1
  • 35
    • 60349099619 scopus 로고    scopus 로고
    • Turing's imitation game: Still an impossible challenge for all machines and some judges-An evaluation of the 2008 Loebner contest
    • L. Floridi, M. Taddeo, and M. Turilli, "Turing's imitation game: Still an impossible challenge for all machines and some judges-An evaluation of the 2008 Loebner contest," Minds Mach., vol. 19, no. 1, pp. 145-150, 2009.
    • (2009) Minds Mach. , vol.19 , Issue.1 , pp. 145-150
    • Floridi, L.1    Taddeo, M.2    Turilli, M.3
  • 36
    • 80054106703 scopus 로고    scopus 로고
    • Symantec, Mountain View, CA, Jan. 25 [Online]
    • "Symantec security response, W32.Imaut.AS worm," Symantec, Mountain View, CA, Jan. 25, 2008 [Online]. Available: http://www. symantec.com/security-response/writeup.jsp?docid=2007-080114-2713-99
    • (2008) Symantec Security Response, W32.Imaut.AS Worm
  • 37
    • 80054117252 scopus 로고    scopus 로고
    • Uber-Geek.com, Jan. 18 [Online]
    • "Yahoo! responder bot," Uber-Geek.com, Jan. 18, 2008 [Online]. Available: http://www.uber-geek.com/bot.shtml
    • (2008) Yahoo! Responder Bot
  • 40
    • 77952331178 scopus 로고    scopus 로고
    • Detecting covert timing channels: An entropy-based approach
    • Alexandria, VA, Oct.
    • S. Gianvecchio and H. Wang, "Detecting covert timing channels: An entropy-based approach," in Proc. ACM CCS, Alexandria, VA, Oct. 2007, pp. 307-316.
    • (2007) Proc. ACM CCS , pp. 307-316
    • Gianvecchio, S.1    Wang, H.2
  • 41
    • 0002442796 scopus 로고    scopus 로고
    • Machine learning in automated text categorization
    • F. Sebastiani, "Machine learning in automated text categorization," ACM Comput. Surveys, vol. 34, no. 1, pp. 1-47, 2002.
    • (2002) ACM Comput. Surveys , vol.34 , Issue.1 , pp. 1-47
    • Sebastiani, F.1
  • 43
    • 79958746877 scopus 로고    scopus 로고
    • Honeybot, your man in the middle for automated social engineering
    • Apr.
    • T. Lauinger, V. Pankakoski, and E. Kirda, "Honeybot, your man in the middle for automated social engineering," presented at the USENIX LEET, Apr. 2010.
    • (2010) USENIX LEET
    • Lauinger, T.1    Pankakoski, V.2    Kirda, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.