메뉴 건너뛰기




Volumn , Issue , 2011, Pages 53-60

A survey on latest botnet attack and defense

Author keywords

Botnet; Domain Fluxing; Fast Fluxing; Survey

Indexed keywords

BOTNET; BOTNETS; CYBER-ATTACKS; DDOS ATTACK; DETECTION METHODS; DOMAIN FLUXING; FAST FLUXING; FUTURE DIRECTIONS; MULTIPLE CRITERIA; NETWORK ATTACK; PHISHING; PRODUCTIVE TOOLS;

EID: 84862975193     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2011.11     Document Type: Conference Paper
Times cited : (55)

References (39)
  • 4
    • 38849103391 scopus 로고    scopus 로고
    • Measurement and analysis of spyware in a university environment
    • USENIX
    • S. Saroiu, S. D. Gribble, and H. M. Levy, "Measurement and analysis of spyware in a university environment." in NSDI. USENIX, 2004, pp. 141-153.
    • (2004) NSDI , pp. 141-153
    • Saroiu, S.1    Gribble, S.D.2    Levy, H.M.3
  • 5
    • 70350357344 scopus 로고    scopus 로고
    • Learning more about the underground economy: A case-study of keyloggers and dropzones
    • M. Backes and P. Ning, Eds., Springer
    • T. Holz, M. Engelberth, and F. C. Freiling, "Learning more about the underground economy: A case-study of keyloggers and dropzones." in ESORICS, M. Backes and P. Ning, Eds., vol. 5789. Springer, 2009, pp. 1-18.
    • (2009) ESORICS , vol.5789 , pp. 1-18
    • Holz, T.1    Engelberth, M.2    Freiling, F.C.3
  • 15
    • 71749083441 scopus 로고    scopus 로고
    • Collaborative detection of fast flux phishing domains
    • C. V. Zhou, C. Leckie, and S. Karunasekera, "Collaborative detection of fast flux phishing domains." JNW, vol. 4, no. 1, pp. 75-84, 2009.
    • (2009) JNW , vol.4 , Issue.1 , pp. 75-84
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 20
    • 84928140517 scopus 로고    scopus 로고
    • Measuring and detecting fast-flux service networks
    • T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, "Measuring and detecting fast-flux service networks," in NDSS, 2008.
    • (2008) NDSS
    • Holz, T.1    Gorecki, C.2    Rieck, K.3    Freiling, F.C.4
  • 25
    • 85084096724 scopus 로고    scopus 로고
    • The heisenbot uncertainty problem: Challenges in separating bots from chaff
    • USENIX Association
    • C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage, "The heisenbot uncertainty problem: Challenges in separating bots from chaff." in LEET. USENIX Association, 2008.
    • (2008) LEET
    • Kanich, C.1    Levchenko, K.2    Enright, B.3    Voelker, G.M.4    Savage, S.5
  • 30
    • 84869596416 scopus 로고    scopus 로고
    • Using failure information analysis to detect enterprise zombies
    • Springer
    • Z. Zhu, V. Yegneswaran, and Y. Chen, "Using failure information analysis to detect enterprise zombies." in SecureComm, vol. 19. Springer, 2009, pp. 185-206.
    • (2009) SecureComm , vol.19 , pp. 185-206
    • Zhu, Z.1    Yegneswaran, V.2    Chen, Y.3
  • 36
    • 0003585297 scopus 로고    scopus 로고
    • San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.
    • J. Han, Data Mining: Concepts and Techniques. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2005.
    • (2005) Data Mining: Concepts and Techniques
    • Han, J.1
  • 37
    • 0022594196 scopus 로고
    • An introduction to hidden markov models
    • L. Rabiner and B. Juang, "An introduction to hidden markov models,"ASSP Magazine, IEEE, pp. 4-16, 1986.
    • (1986) ASSP Magazine, IEEE , pp. 4-16
    • Rabiner, L.1    Juang, B.2
  • 38
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • L. Rabiner, "A tutorial on hidden markov models and selected applications in speech recognition," Proceedings of the IEEE, pp. 257-286, 1989.
    • (1989) Proceedings of the IEEE , pp. 257-286
    • Rabiner, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.