메뉴 건너뛰기




Volumn 20, Issue 5, 2012, Pages 1663-1677

Detecting algorithmically generated domain-flux attacks with DNS traffic analysis

Author keywords

Components; domain flux; domain names; Edit distance; entropy; IP fast flux; Jaccard index; malicious

Indexed keywords

COMPONENTS; DOMAIN NAMES; EDIT DISTANCE; FAST FLUX; JACCARD INDEX; MALICIOUS;

EID: 84867774439     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2012.2184552     Document Type: Article
Times cited : (223)

References (35)
  • 1
    • 84867796906 scopus 로고    scopus 로고
    • BotLab
    • BotLab, "BotLab: A study in spam," 2011 [Online]. Available: http://botlab.org
    • (2011) BotLab: A Study in Spam
  • 2
    • 84867817051 scopus 로고    scopus 로고
    • McAfee
    • McAfee, "McAfee Site Advisor," 2011 [Online]. Available: http://www.siteadvisor.com
    • (2011) McAfee Site Advisor
  • 3
    • 60349090690 scopus 로고    scopus 로고
    • Damballa, Inc., Atlanta, GA
    • P. Royal, "On Kraken and Bobax botnets," Damballa, Inc., Atlanta, GA, 2008 [Online]. Available: http://www.damballa.com/downloads/r-pubs/ Kraken-Response.pdf
    • (2008) On Kraken and Bobax Botnets
    • Royal, P.1
  • 4
    • 60349090690 scopus 로고    scopus 로고
    • Damballa, Inc., Atlanta, GA
    • P. Royal, "On Kraken and Bobax botnets," Damballa, Inc., Atlanta, GA, 2008 [Online]. Available: http://www.damballa.com/downloads/r-pubs/ Kraken-Response.pdf
    • (2008) On Kraken and Bobax Botnets
    • Royal, P.1
  • 5
    • 84867833362 scopus 로고    scopus 로고
    • PC Tools
    • PC Tools, "PC Tools experts crack new Kraken," 2008 [Online]. Available: http://www.pctools.com/news/view/id/202/
    • (2008) PC Tools Experts Crack New Kraken
  • 6
    • 84867833361 scopus 로고    scopus 로고
    • Twitter API still attracts hackers
    • "Twitter API still attracts hackers," Unmask Parasites blog, 2009 [Online]. Available: http://blog.unmaskparasites.com/2009/12/09/twitterapi- still-attracts-hackers/
    • (2009) Unmask Parasites Blog
  • 7
    • 84867824972 scopus 로고    scopus 로고
    • WOT
    • WOT, "Web of Trust," 2011 [Online]. Available: http://mywot.com
    • (2011) Web of Trust
  • 8
    • 84867802728 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft, "Win32/Hamewq," 2009 [Online]. Available: http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry. aspx?Name=Win32/Hamweq
    • (2009) Win32/Hamewq
  • 9
    • 84867757379 scopus 로고    scopus 로고
    • Yahoo! Research
    • Yahoo! Research, "Yahoo! Webspam database," [Online]. Available: http://barcelona.research.yahoo.net/webspam/datasets/uk2007/
    • Yahoo! Webspam Database
  • 14
    • 78751511305 scopus 로고    scopus 로고
    • Measurement and classification of humans and bots in internet chat
    • S. Gianvecchio,M. Xie, Z.Wu, and H.Wang, "Measurement and classification of humans and bots in internet chat," in Proc. 17th USENIX Security, 2008, pp. 155-169.
    • (2008) Proc. 17th USENIX Security , pp. 155-169
    • Gianvecchio, S.1    Xie, M.2    Wu, Z.3    Wang, H.4
  • 15
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee, "BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection," in Proc. 17th USENIX Security, 2008, pp. 139-154.
    • (2008) Proc. 17th USENIX Security , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 16
    • 85175133385 scopus 로고    scopus 로고
    • BotSniffer: Detecting botnet command and control channels in network traffic
    • Feb.
    • G. Gu, J. Zhang, and W. Lee, "BotSniffer: Detecting botnet command and control channels in network traffic," presented at the 15th Annu. NDSS, Feb. 2008.
    • (2008) The 15th Annu. NDSS
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 17
    • 85084097128 scopus 로고    scopus 로고
    • Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
    • Apr. Article no. 9
    • T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F. Freiling, "Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm," in Proc. 1st USENIX LEET, Apr. 2008, Article no. 9.
    • (2008) Proc. 1st USENIX LEET
    • Holz, T.1    Steiner, M.2    Dahl, F.3    Biersack, E.W.4    Freiling, F.5
  • 18
    • 70350630557 scopus 로고    scopus 로고
    • Beyond blacklists: Learning to detect malicious Web sites from suspicious URLs
    • Jul.
    • S. Savage, J. Ma, L. K. Saul, and G. Voelker, "Beyond blacklists: Learning to detect malicious Web sites from suspicious URLs," in Proc. ACM KDD, Jul. 2009, pp. 1245-1254.
    • (2009) Proc. ACM KDD , pp. 1245-1254
    • Savage, S.1    Ma, J.2    Saul, L.K.3    Voelker, G.4
  • 23
    • 85084094635 scopus 로고    scopus 로고
    • Behind phishing: An examination of phisher modi operandi
    • Apr. Article no. 4
    • D. K. McGrath and M. Gupta, "Behind phishing: An examination of phisher modi operandi," in Proc. USENIX LEET, Apr. 2008, Article no. 4.
    • (2008) Proc. USENIX LEET
    • McGrath, D.K.1    Gupta, M.2
  • 25
    • 77950795817 scopus 로고    scopus 로고
    • Detecting malicious flux service networks through passive analysis of recursive DNS traces
    • Dec.
    • R. Perdisci, I. Corona, D. Dagon, and W. Lee, "Detecting malicious flux service networks through passive analysis of recursive DNS traces," in Proc. ACSAC, Dec. 2009, pp. 311-320.
    • (2009) Proc. ACSAC , pp. 311-320
    • Perdisci, R.1    Corona, I.2    Dagon, D.3    Lee, W.4
  • 26
    • 60349101742 scopus 로고    scopus 로고
    • Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
    • DOI 10.1109/ICDM.2006.165, 4053075, Proceedings - Sixth International Conference on Data Mining, ICDM 2006
    • R. Perdisci, G. Gu, and W. Lee, "Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems," in Proc. IEEE ICDM, 2006, pp. 488-498. (Pubitemid 47485828)
    • (2007) Proceedings - IEEE International Conference on Data Mining, ICDM , pp. 488-498
    • Perdisci, R.1    Gu, O.2    Lee, W.3
  • 27
    • 77956153922 scopus 로고    scopus 로고
    • Conficker C P2P protocol and implementation
    • Menlo Park, CA, Tech. Rep. Sep.
    • P. Porras, H. Saidi, and V. Yegneswaran, "Conficker C P2P protocol and implementation," SRI International, Menlo Park, CA, Tech. Rep., Sep. 2009.
    • (2009) SRI International
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 30
    • 80052735307 scopus 로고    scopus 로고
    • Inside the storm: Protocols and encryption of the storm botnet
    • J. Stewart, "Inside the storm: Protocols and encryption of the storm botnet," presented at the Black Hat Tech. Security Conf., 2008.
    • (2008) The Black Hat Tech. Security Conf.
    • Stewart, J.1
  • 33
    • 65249141597 scopus 로고    scopus 로고
    • Unconstrained endpoint profiling: Googling the internet
    • Aug.
    • I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci, "Unconstrained endpoint profiling: Googling the internet," in Proc. ACM SIGCOMM, Aug. 2008, pp. 279-290.
    • (2008) Proc. ACM SIGCOMM , pp. 279-290
    • Trestian, I.1    Ranjan, S.2    Kuzmanovic, A.3    Nucci, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.