메뉴 건너뛰기




Volumn 376 AICT, Issue , 2012, Pages 87-102

Peer to peer botnet detection based on flow intervals

Author keywords

Botnet; Network Flows; Network Intrusion Detection; Traffic Behavior Analysis

Indexed keywords

DENIAL-OF-SERVICE ATTACK; INTRUSION DETECTION; LEARNING SYSTEMS; NETWORK SECURITY;

EID: 84863885019     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-30436-1_8     Document Type: Conference Paper
Times cited : (44)

References (21)
  • 6
    • 77955469676 scopus 로고    scopus 로고
    • An Overview of IP Flow-Based Intrusion Detection
    • Sperotto, A., et al.: An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys & Tutorial 12(3) (2010)
    • (2010) IEEE Communications Surveys & Tutorial , vol.12 , Issue.3
    • Sperotto, A.1
  • 7
    • 85061529860 scopus 로고    scopus 로고
    • BotHunter: Deteting Malware Infection Through IDS-Driven Dialog Correlation
    • Gu, G., et al.: BotHunter: Deteting Malware Infection Through IDS-Driven Dialog Correlation. In: Proceedings of the 16th USENIX Security Symposium, pp. 167-182 (2007)
    • (2007) Proceedings of the 16th USENIX Security Symposium , pp. 167-182
    • Gu, G.1
  • 8
  • 9
    • 78651593637 scopus 로고    scopus 로고
    • Online Botnet Detection Based on Incremental Discrete Fourier Transform
    • Yu, X., et al.: Online Botnet Detection Based on Incremental Discrete Fourier Transform. Journal of Networks 5(5) (2010)
    • (2010) Journal of Networks , vol.5 , Issue.5
    • Yu, X.1
  • 10
    • 46149123241 scopus 로고    scopus 로고
    • Using Machine Learning Techniques to Identify Botnet Traffic
    • Livadas, C., et al.: Using Machine Learning Techniques to Identify Botnet Traffic. In: 2nd IEEE LCN Workshop on Network Security, pp. 967-974 (2006)
    • (2006) 2nd IEEE LCN Workshop on Network Security , pp. 967-974
    • Livadas, C.1
  • 17
    • 84863949448 scopus 로고    scopus 로고
    • French Chapter | The Honeynet Project. The Honeynet Project
    • The Honeynet Project, French Chapter | The Honeynet Project. The Honeynet Project, http://www.honeynet.org/chapters/france
  • 18
    • 43949108876 scopus 로고    scopus 로고
    • On the Validation of Traffic Classification Algorithms
    • Claypool, M., Uhlig, S. (eds.) PAM 2008. Springer, Heidelberg
    • Szabó, G., Orincsay, D., Malomsoky, S., Szabó, I.: On the Validation of Traffic Classification Algorithms. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol. 4979, pp. 72-81. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4979 , pp. 72-81
    • Szabó, G.1    Orincsay, D.2    Malomsoky, S.3    Szabó, I.4
  • 19
    • 84863949449 scopus 로고    scopus 로고
    • Lawrence Berkeley National Laboratory and ICSI., LBNL/ICSI Enterprise Tracing Project. LBNL Enterprise Trace Repository
    • Lawrence Berkeley National Laboratory and ICSI., LBNL/ICSI Enterprise Tracing Project. LBNL Enterprise Trace Repository (2005), http://www.icir.org/ enterprise-tracing
    • (2005)
  • 21
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of USENIX LISA 1999 (1999)
    • (1999) Proceedings of USENIX LISA 1999
    • Roesch, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.