메뉴 건너뛰기




Volumn 19 LNICST, Issue , 2009, Pages 185-206

Using failure information analysis to detect enterprise zombies

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION FAILURE; BOTNETS; EMPIRICAL STUDIES; ENTERPRISE NETWORKS; FAILURE ACTIVITY; FAILURE INFORMATION; FAILURE PATTERNS; MALWARES; NOVEL STRATEGIES; PROTOTYPE SYSTEM; REAL-WORLD APPLICATION; SELF-PROPAGATING; SYSTEM USE;

EID: 84869596416     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-05284-2_11     Document Type: Conference Paper
Times cited : (12)

References (44)
  • 1
    • 39749138879 scopus 로고    scopus 로고
    • Data clustering, http://www.let.rug.nl/~kleiweg/clustering/
    • Data Clustering
  • 2
    • 84885887386 scopus 로고    scopus 로고
    • Entropy, http://en.wikipedia.org/wiki/Information-entropy
    • Entropy
  • 3
    • 84885883809 scopus 로고    scopus 로고
    • Gnu wget, http://www.gnu.org/software/wget/
    • Gnu Wget
  • 4
    • 84885886669 scopus 로고    scopus 로고
    • Kademlia, http://en.wikipedia.org/wiki/Kademlia
    • Kademlia
  • 10
    • 38149089416 scopus 로고    scopus 로고
    • Automated classification and analysis of internet malware
    • Kruegel, C., Lippmann, R., Clark, A. (eds.) LNCS Springer, Heidelberg
    • Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178-197. Springer, Heidelberg (2007)
    • (2007) RAID 2007 , vol.4637 , pp. 178-197
    • Bailey, M.1    Oberheide, J.2    Andersen, J.3    Mao, Z.M.4    Jahanian, F.5    Nazario, J.6
  • 14
    • 84865382456 scopus 로고    scopus 로고
    • An introduction to intrusion detection systems
    • Debar, H.: An Introduction to Intrusion Detection Systems. In: Proceedings of Connect (2000)
    • (2000) Proceedings of Connect
    • Debar, H.1
  • 15
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Estan, C., Savage, S., Varghese, G.: Automatically Inferring Patterns of Resource Consumption in Network Traffic. In: Proceedings of ACM SIGCOMM (2003)
    • (2003) Proceedings of ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 19
    • 78751511305 scopus 로고    scopus 로고
    • Measurement and classification of humans and bots in internet
    • Gianvecchio, S., Xie, M., Wu, Z., Wang, H.: Measurement and classification of humans and bots in internet. In: USENIX Security (2008)
    • (2008) USENIX Security
    • Gianvecchio, S.1    Xie, M.2    Wu, Z.3    Wang, H.4
  • 22
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th USENIX Security Symposium (2008)
    • (2008) Proceedings of the 17th USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 25
    • 84928140517 scopus 로고    scopus 로고
    • Measuring and detecting fast-flux service networks
    • Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and detecting fast-flux service networks. In: NDSS (2008)
    • (2008) NDSS
    • Holz, T.1    Gorecki, C.2    Rieck, K.3    Freiling, F.C.4
  • 26
    • 84885891410 scopus 로고    scopus 로고
    • Malware Threat Center
    • SRI International. Malware Threat Center (2008), http://mtc.sri.org
    • (2008)
  • 29
    • 70849095357 scopus 로고    scopus 로고
    • What's going on? Learning communication rules in edge networks
    • Kandula, S., Chandra, R., Katabi, D.: What's going on? Learning communication rules in edge networks. In: Sigcomm (2008)
    • (2008) Sigcomm
    • Kandula, S.1    Chandra, R.2    Katabi, D.3
  • 36
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • San Antonio, TX January
    • Paxson, V.: Bro: A system for detecting network intruders in real-time. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX (January 1998)
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Paxson, V.1
  • 37
    • 0023453329 scopus 로고
    • Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
    • Rousseeuw, P.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics 20 (1987)
    • (1987) Journal of Computational and Applied Mathematics , vol.20
    • Rousseeuw, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.