메뉴 건너뛰기




Volumn 9, Issue 5, 2012, Pages 714-726

Early detection of malicious Flux networks via large-scale passive DNS traffic analysis

Author keywords

classification; clustering; DNS; Flux networks; Internet security; passive traffic analysis

Indexed keywords

CLASSIFICATION (OF INFORMATION); NETWORK SECURITY;

EID: 84864753059     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.35     Document Type: Article
Times cited : (102)

References (20)
  • 1
    • 84864742852 scopus 로고    scopus 로고
    • SSAC, SAC 025 -SSAC Advisory on Fast Flux Hosting and DNS
    • SSAC, "SAC 025 -SSAC Advisory on Fast Flux Hosting and DNS," http://www.icann.org/en/committees/security/sac025. pdf, 2008.
    • (2008)
  • 2
    • 84864747709 scopus 로고    scopus 로고
    • The Honeynet Project,Know Your Enemy: Fast-Flux Service Networks
    • The Honeynet Project,Know Your Enemy: Fast-Flux Service Networks, http://old.honeynet.org/papers/ff/fast-flux.html,2007.
    • (2007)
  • 8
    • 84864747711 scopus 로고    scopus 로고
    • ISC Security Information Exchange
    • ISC Security Information Exchange, https://sie.isc.org,, 2012.
    • (2012)
  • 18
    • 84864749621 scopus 로고    scopus 로고
    • Zeus Tracker
    • Zeus Tracker,https://zeustracker.abuse.ch/,2012.
    • (2012)
  • 20
    • 79960855165 scopus 로고    scopus 로고
    • Good guys vs. Bot guise: Mimicry attacks against fast-flux detection systems
    • M. Knysz, X. Hu, and K.G. Shin, "Good Guys vs. Bot Guise: Mimicry Attacks against Fast-Flux Detection Systems," Proc. IEEE INFOCOM, 2011.
    • (2011) Proc.IEEE INFOCOM
    • Knysz, M.1    Hu, X.2    Shin, K.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.