메뉴 건너뛰기




Volumn 96 LNICST, Issue , 2012, Pages 446-459

Winning with DNS failures: Strategies for faster botnet detection

Author keywords

Botnet; DNS; Domain fluxing; Failures

Indexed keywords

AUTONOMOUS SYSTEMS; BOTNET; BOTNETS; COMMAND AND CONTROL; DATA SETS; DNS; DOMAIN-FLUXING; FALSE POSITIVE RATES; INFORMATION ENTROPY; REAL-TIME DETECTION; SERVER ADDRESS; SOUTH ASIA; TEMPORAL CORRELATIONS;

EID: 84869596872     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-31909-9_26     Document Type: Conference Paper
Times cited : (75)

References (13)
  • 1
    • 84870720286 scopus 로고    scopus 로고
    • Conficker Working Group, http://www.confickerworkinggroup.org/wiki/ pmwiki.php/ANY/FAQ#toc5
  • 2
    • 84870665870 scopus 로고    scopus 로고
    • New Technique Spots Sneaky Botnets, http://mobile.darkreading.com/9292/ show/4711c9403b772e7281ae08cee69758cc&t=461a4a89abc0a0c761234d11086f5003
    • New Technique Spots Sneaky Botnets
  • 13
    • 84869596416 scopus 로고    scopus 로고
    • Using Failure Information Analysis to Detect Enterprise Zombies
    • Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Springer, Heidelberg
    • Zhu, Z., Yegneswaran, V., Chen, Y.: Using Failure Information Analysis to Detect Enterprise Zombies. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 185-206. Springer, Heidelberg (2009)
    • (2009) LNICST , vol.19 , pp. 185-206
    • Zhu, Z.1    Yegneswaran, V.2    Chen, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.