메뉴 건너뛰기




Volumn 7465 LNCS, Issue , 2012, Pages 624-638

A collaborative approach to botnet protection

Author keywords

Botnet Detection; Botnets; Collaborative Framework; Correlation Analysis

Indexed keywords

ANTIVIRUS SOFTWARES; APPLICATION PROGRAMS; BOTNETS; COLLABORATIVE APPROACH; COLLABORATIVE FRAMEWORK; CORRELATION ANALYSIS; CURRENT TRENDS; DETECTION APPROACH; DETECTION FRAMEWORK; DETECTION TECHNIQUE; INTERNET-BASED SERVICES; MALICIOUS SOFTWARE; NETWORK TRAFFIC; NEUTRALISATION; PUBLIC ADMINISTRATION; SUB-SYSTEMS;

EID: 84865661798     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32498-7_47     Document Type: Conference Paper
Times cited : (12)

References (37)
  • 2
    • 84655163180 scopus 로고    scopus 로고
    • Identifying botnets by capturing group activities in DNS traffic
    • Choi, H., Lee, H.: Identifying botnets by capturing group activities in DNS traffic. Journal of Computer Networks 56, 20-33 (2011)
    • (2011) Journal of Computer Networks , vol.56 , pp. 20-33
    • Choi, H.1    Lee, H.2
  • 4
    • 82455194720 scopus 로고    scopus 로고
    • Identifying malware using cross-evidence correlation
    • Peterson, G., Shenoi, S. (eds.) IFIP ACIT, ch.13, Springer, Boston
    • Flaglien, A., Franke, K., Årnes, A.: Identifying malware using cross-evidence correlation. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics VII. IFIP ACIT, ch.13, vol. 361, pp. 169-182. Springer, Boston (2011)
    • (2011) Advances in Digital Forensics VII , vol.361 , pp. 169-182
    • Flaglien, A.1    Franke, K.2    Årnes, A.3
  • 8
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
    • Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th Conference on Security Symposium, pp. 139-154 (2008)
    • (2008) Proceedings of the 17th Conference on Security Symposium , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 13
    • 78751649445 scopus 로고    scopus 로고
    • Clustering botnet communication traffic based on n-gram feature selection
    • Lu, W., Rammidi, G., Ghorbani, A.A.: Clustering botnet communication traffic based on n-gram feature selection. Computer Communications 34, 502-514 (2011)
    • (2011) Computer Communications , vol.34 , pp. 502-514
    • Lu, W.1    Rammidi, G.2    Ghorbani, A.A.3
  • 14
    • 0003839495 scopus 로고
    • PhD thesis, University of Stirling, Dept. of Computer Science and Mathematics
    • Marsh, S.: Formalizing Trust as a Computational Concept, PhD thesis, University of Stirling, Dept. of Computer Science and Mathematics (1994)
    • (1994) Formalizing Trust As a Computational Concept
    • Marsh, S.1
  • 16
    • 0038011185 scopus 로고    scopus 로고
    • Constructing attack scenarios through correlation of intrusion alerts
    • ACM November
    • Ning, P., Cui, Y., Reeves, D.S.: Constructing attack scenarios through correlation of intrusion alerts. In: Proceedings of CCS 2002, pp. 245-254. ACM (November 2002)
    • (2002) Proceedings of CCS 2002 , pp. 245-254
    • Ning, P.1    Cui, Y.2    Reeves, D.S.3
  • 17
    • 78249256060 scopus 로고    scopus 로고
    • Community Epidemic Detection Using Time-Correlated Anomalies
    • Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
    • Oliner, A.J., Kulkarni, A.V., Aiken, A.: Community Epidemic Detection Using Time-Correlated Anomalies. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 360-381. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6307 , pp. 360-381
    • Oliner, A.J.1    Kulkarni, A.V.2    Aiken, A.3
  • 21
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • USENIX Association
    • Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of Usenix LISA 1999. USENIX Association (1999)
    • (1999) Proceedings of Usenix LISA 1999
    • Roesch, M.1
  • 23
  • 26
    • 84865618856 scopus 로고    scopus 로고
    • Characterizing bots' remote control behavior
    • Lee, W., Wang, C., Dagon, D. (eds.) Springer
    • Stinson, E., Mitchell, J.C.: Characterizing bots' remote control behavior. In: Lee, W., Wang, C., Dagon, D. (eds.) Botnet Detection, Advances in Information Security, vol. 36, pp. 45-64. Springer (2008)
    • (2008) Botnet Detection, Advances in Information Security , vol.36 , pp. 45-64
    • Stinson, E.1    Mitchell, J.C.2
  • 28
    • 84865626535 scopus 로고    scopus 로고
    • Symantec global internet security threat report, trends for 2010
    • Symantec Inc.: Symantec Inc. April
    • Symantec Inc.: Symantec global internet security threat report, trends for 2010. Security Report XVI, Symantec Inc. (April 2011)
    • (2011) Security Report , vol.16
  • 29
    • 84865645121 scopus 로고    scopus 로고
    • Symantec Inc. Tech. rep., Symantec Inc.
    • Symantec Inc.: Counterclank bot. Tech. rep., Symantec Inc. (2012), http://www.symantec.com/security-response/writeup.jsp?docid=2012-012709-4046-99
    • (2012) Counterclank Bot
  • 32
    • 83455200739 scopus 로고    scopus 로고
    • Botnet detection architecture based on heterogeneous multi-sensor information fusion
    • Wang, H., Hou, J., Gong, Z.: Botnet detection architecture based on heterogeneous multi-sensor information fusion. Journal of Networks 6(12), 1655-1661 (2011)
    • (2011) Journal of Networks , vol.6 , Issue.12 , pp. 1655-1661
    • Wang, H.1    Hou, J.2    Gong, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.