메뉴 건너뛰기




Volumn 56, Issue 1, 2012, Pages 20-33

Identifying botnets by capturing group activities in DNS traffic

Author keywords

Botnet; DNS; Group activity

Indexed keywords

BOTNET; BOTNETS; CAMPUS NETWORK; DNS; ENCRYPTED COMMUNICATION; FUNDAMENTAL CHARACTERISTICS; GROUP ACTIVITIES; IDENTITY THEFT; LARGE-SCALE NETWORK; LIGHT WEIGHT; NETWORK TRAFFIC; PHISHING; REAL TIME MONITORING;

EID: 84655163180     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2011.07.018     Document Type: Article
Times cited : (113)

References (55)
  • 28
    • 79952049946 scopus 로고    scopus 로고
    • Clustering botnet communication traffic based on n-gram feature selection
    • W. Lu, G. Rammidi, and A.A. Ghorbani Clustering botnet communication traffic based on n-gram feature selection Computer Communications 2010
    • (2010) Computer Communications
    • Lu, W.1    Rammidi, G.2    Ghorbani, A.A.3
  • 46
    • 84655171034 scopus 로고    scopus 로고
    • Korea Information Security Agency (KISA)
    • Korea Information Security Agency (KISA), Botnet C&C server domain list, 2009.
    • (2009) Botnet C&C Server Domain List
  • 53
    • 33846568074 scopus 로고    scopus 로고
    • Working the botnet: How dynamic DNS is revitalising the zombie army
    • S. Herona Working the botnet: how dynamic DNS is revitalising the zombie army Network Security 2007 2007 9 11
    • (2007) Network Security , vol.2007 , pp. 9-11
    • Herona, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.