메뉴 건너뛰기




Volumn , Issue , 2012, Pages 988-993

DNSSM: A large scale passive DNS security monitoring framework

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVITY PROFILE; ARCHITECTURAL APPROACH; CLUSTERING TECHNIQUES; DISTRIBUTED PROCESSING; MONITORING APPROACH; OFFLINE; SECURITY MONITORING; STATE OF THE ART; SYSTEM LEVELS;

EID: 84864221133     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOMS.2012.6212019     Document Type: Conference Paper
Times cited : (25)

References (26)
  • 6
    • 84871952639 scopus 로고    scopus 로고
    • "Akamai cdn," http://www.akamai.com/.
    • Akamai Cdn
  • 8
    • 84871106113 scopus 로고    scopus 로고
    • CRAN
    • CRAN, "R-project," http://www.r-project.org.
    • R-project
  • 11
    • 70450239200 scopus 로고    scopus 로고
    • Measuring and evaluating large-scale cdns paper withdrawn at mirosoft's request
    • Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, ser. New York, NY, USA: [Online]. Available
    • C. Huang, A. Wang, J. Li, and K. W. Ross, "Measuring and evaluating large-scale cdns paper withdrawn at mirosoft's request," in Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, ser. IMC '08. New York, NY, USA: ACM, 2008, pp. 15-29. [Online]. Available: http://dl.acm.org/citation. cfm?id=1452520.1455517
    • (2008) IMC '08 , pp. 15-29
    • Huang, C.1    Wang, A.2    Li, J.3    Ross, K.W.4
  • 14
    • 84861963312 scopus 로고    scopus 로고
    • Detecting dns tunnels using character frequency analysis
    • vol. abs/1004.4358
    • K. Born and D. Gustafson, "Detecting dns tunnels using character frequency analysis," CoRR, vol. abs/1004.4358, 2010.
    • (2010) CoRR
    • Born, K.1    Gustafson, D.2
  • 18
    • 85068725031 scopus 로고    scopus 로고
    • Building a dynamic reputation system for dns
    • Proceedings of the 19th USENIX conference on Security, ser. Berkeley, CA, USA: USENIX Association
    • M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, "Building a dynamic reputation system for dns," in Proceedings of the 19th USENIX conference on Security, ser. USENIX Security'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 18-18.
    • (2010) USENIX Security'10 , pp. 18-18
    • Antonakakis, M.1    Perdisci, R.2    Dagon, D.3    Lee, W.4    Feamster, N.5
  • 19
    • 37849037483 scopus 로고    scopus 로고
    • Passive monitoring of dns anomalies
    • Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, ser. Berlin, Heidelberg: Springer-Verlag
    • B. Zdrnja, N. Brownlee, and D. Wessels, "Passive monitoring of dns anomalies," in Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, ser. DIMVA '07. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 129-139.
    • (2007) DIMVA '07 , pp. 129-139
    • Zdrnja, B.1    Brownlee, N.2    Wessels, D.3
  • 22
    • 78249250853 scopus 로고    scopus 로고
    • A centralized monitoring infrastructure for improving dns security
    • Proceedings of the 13th international conference on Recent advances in intrusion detection, ser. Berlin, Heidelberg: Springer-Verlag
    • M. Antonakakis, D. Dagon, X. Luo, R. Perdisci, W. Lee, and J. Bellmor, "A centralized monitoring infrastructure for improving dns security," in Proceedings of the 13th international conference on Recent advances in intrusion detection, ser. RAID'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 18-37.
    • (2010) RAID'10 , pp. 18-37
    • Antonakakis, M.1    Dagon, D.2    Luo, X.3    Perdisci, R.4    Lee, W.5    Bellmor, J.6
  • 24
    • 77950795817 scopus 로고    scopus 로고
    • Detecting malicious flux service networks through passive analysis of recursive dns traces
    • Proceedings of the 2009 Annual Computer Security Applications Conference, ser. Washington, DC, USA: IEEE Computer Society
    • R. Perdisci, I. Corona, D. Dagon, and W. Lee, "Detecting malicious flux service networks through passive analysis of recursive dns traces," in Proceedings of the 2009 Annual Computer Security Applications Conference, ser. ACSAC '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 311-320.
    • (2009) ACSAC '09 , pp. 311-320
    • Perdisci, R.1    Corona, I.2    Dagon, D.3    Lee, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.