메뉴 건너뛰기




Volumn 6, Issue 12, 2011, Pages 1655-1661

Botnet detection architecture based on heterogeneous multi-sensor information fusion

Author keywords

Botnet; Botnet detection; D S theory; Information fusion; Network security

Indexed keywords

BOTNET; CORE COMPONENTS; CURRENT DETECTION; CYBER COMMUNITIES; DECISION FUSION; DEMPSTER-SHAFER; DETECTION EFFECT; DS THEORY; INFORMATION INTEGRATION; INFORMATION SOURCES; MULTI-SENSOR INFORMATION FUSION; REPRESENTATIVE CASE; RESEARCH TOPICS;

EID: 83455200739     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.6.12.1655-1661     Document Type: Article
Times cited : (7)

References (39)
  • 3
    • 75249105893 scopus 로고    scopus 로고
    • WIRED MAGZINE: ISSUE 15.09 [Online], Available
    • J. Davis, "Hackers take down the most wired country in europe, " WIRED MAGZINE: ISSUE 15.09 [Online], 2007, Available: http://www.wired.com/politics/security/magazine/15-09/ff_estonia.
    • (2007) Hackers take down the most wired country in europe
    • Davis, J.1
  • 9
    • 17844404852 scopus 로고    scopus 로고
    • Malicious bots threaten network security
    • D. Geer, "Malicious bots threaten network security, " IEEE Computer, vol. 38, no. 1, pp. 18-20, 2005.
    • (2005) IEEE Computer , vol.38 , Issue.1 , pp. 18-20
    • Geer, D.1
  • 11
    • 67349187725 scopus 로고    scopus 로고
    • Information fusion in computer security
    • G. Giorgio, R. Fabio, and S. Carlo, "Information fusion in computer security, " Information Fusion, vol. 10, no. 4, pp. 272-273, 2009.
    • (2009) Information Fusion , vol.10 , Issue.4 , pp. 272-273
    • Giorgio, G.1    Fabio, R.2    Carlo, S.3
  • 12
    • 41949123110 scopus 로고    scopus 로고
    • Research and Development of Botnets
    • J. Zhuge, X. Han, Y. Zhou, Z. Ye, and W. Zou, "Research and Development of Botnets, " Journal of Software, vol. 19, no. 3, pp. 702-715, 2008.
    • (2008) Journal of Software , vol.19 , Issue.3 , pp. 702-715
    • Zhuge, J.1    Han, X.2    Zhou, Y.3    Ye, Z.4    Zou, W.5
  • 16
    • 85080378133 scopus 로고    scopus 로고
    • An algorithm for anomalybased Botnet detection
    • J. R. Binkley and S. Singh, "An algorithm for anomalybased Botnet detection, " Proc. USENIX SRUTI'06, 2006, pp. 43-48.
    • (2006) Proc. USENIX SRUTI'06 , pp. 43-48
    • Binkley, J.R.1    Singh, S.2
  • 27
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol-and structureindependent Botnet detection
    • USA
    • G. Gu, J. Zhang, and R. Perdisci, "Botminer: Clustering analysis of network traffic for protocol-and structureindependent Botnet detection, " Proc. 17th USENIX Security Symposium (Security'08), USA, 2008.
    • (2008) Proc. 17th USENIX Security Symposium (Security'08)
    • Gu, G.1    Zhang, J.2    Perdisci, R.3
  • 29
    • 67349098438 scopus 로고    scopus 로고
    • A special issue on information fusion in computer security
    • B.V. Dasarathy, "A special issue on information fusion in computer security, " Information Fusion, vol. 10, no. 4, pp. 271, 2009.
    • (2009) Information Fusion , vol.10 , Issue.4 , pp. 271
    • Dasarathy, B.V.1
  • 33
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by a multivalued mapping
    • A.P. Dempster, "Upper and lower probabilities induced by a multivalued mapping, " Ann. Math. Statist., 1967, pp. 325-339.
    • (1967) Ann. Math. Statist. , pp. 325-339
    • Dempster, A.P.1
  • 36
    • 40949153949 scopus 로고    scopus 로고
    • Research on Security Information Fusion from Multiple Heterogeneous Sensors
    • L. Ma, L. Yang, and J. Wang, "Research on Security Information Fusion from Multiple Heterogeneous Sensors, " Journal of System Simulation, vol. 20, no. 4, pp. 181-187, 2008.
    • (2008) Journal of System Simulation , vol.20 , Issue.4 , pp. 181-187
    • Ma, L.1    Yang, L.2    Wang, J.3
  • 38
    • 77954499290 scopus 로고    scopus 로고
    • Botnet traffic detection techniques by C&C session classification using SVM
    • Japan
    • S. Kondo and N. Sato, "Botnet traffic detection techniques by C&C session classification using SVM, " Proc. 2nd International Workshop on Security, Japan, 2007.
    • (2007) Proc. 2nd International Workshop on Security
    • Kondo, S.1    Sato, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.