메뉴 건너뛰기




Volumn 2012, Issue , 2012, Pages

Modeling and analysis of peer-to-peer botnets

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84870045409     PISSN: 10260226     EISSN: 1607887X     Source Type: Journal    
DOI: 10.1155/2012/865075     Document Type: Article
Times cited : (12)

References (26)
  • 1
    • 78649316131 scopus 로고    scopus 로고
    • Modeling and analyzing of botnet interactions
    • 2-s2.0-78649316131 10.1016/j.physa.2010.10.001
    • Song L. P., Jin Z., Sun G. Q., Modeling and analyzing of botnet interactions. Physica A 2011 390 2 347 358 2-s2.0-78649316131 10.1016/j.physa.2010.10.001
    • (2011) Physica A , vol.390 , Issue.2 , pp. 347-358
    • Song, L.P.1    Jin, Z.2    Sun, G.Q.3
  • 2
    • 84870034508 scopus 로고    scopus 로고
    • The research on approaches for botnet detection
    • 10.1016/j.egypro.2011.12.792
    • Zhang W. F., Jin C., The research on approaches for botnet detection. Energy Procedia 2011 13 9726 9732 10.1016/j.egypro.2011.12.792
    • (2011) Energy Procedia , vol.13 , pp. 9726-9732
    • Zhang, W.F.1    Jin, C.2
  • 4
    • 71649087916 scopus 로고    scopus 로고
    • On the detection and identification of botnets
    • 2-s2.0-71649087916 10.1016/j.cose.2009.07.007
    • Seewald A. K., Gansterer W. N., On the detection and identification of botnets. Computers and Security 2010 29 1 45 58 2-s2.0-71649087916 10.1016/j.cose.2009.07.007
    • (2010) Computers and Security , vol.29 , Issue.1 , pp. 45-58
    • Seewald, A.K.1    Gansterer, W.N.2
  • 5
    • 79952572775 scopus 로고    scopus 로고
    • Botnets: To what extent are they a threat to information security?
    • 2-s2.0-79952572775 10.1016/j.istr.2010.11.003
    • Elliott C., Botnets: to what extent are they a threat to information security? Information Security Technical Report 2010 15 3 79 103 2-s2.0-79952572775 10.1016/j.istr.2010.11.003
    • (2010) Information Security Technical Report , vol.15 , Issue.3 , pp. 79-103
    • Elliott, C.1
  • 6
    • 78751649445 scopus 로고    scopus 로고
    • Clustering botnet communication traffic based on n-gram feature selection
    • 2-s2.0-78751649445 10.1016/j.comcom.2010.04.007
    • Lu W., Rammidi G., Ghorbani A. A., Clustering botnet communication traffic based on n-gram feature selection. Computer Communications 2011 34 3 502 514 2-s2.0-78751649445 10.1016/j.comcom.2010.04.007
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 502-514
    • Lu, W.1    Rammidi, G.2    Ghorbani, A.A.3
  • 7
    • 80955158545 scopus 로고    scopus 로고
    • Estimating botnet virulence within mathematical models of botnet propagation dynamics
    • 10.1016/j.cose.2011.07.004
    • Rrushi J., Mokhtari E., Ghorbani A. A., Estimating botnet virulence within mathematical models of botnet propagation dynamics. Computer & Security 2011 30 791 802 10.1016/j.cose.2011.07.004
    • (2011) Computer & Security , vol.30 , pp. 791-802
    • Rrushi, J.1    Mokhtari, E.2    Ghorbani, A.A.3
  • 8
    • 33746642190 scopus 로고    scopus 로고
    • Worms and viruses and botnets, Oh My!
    • DOI 10.1109/MSP.2006.83, 1637381
    • Schaffer G. P., Worms and viruses and botnets, Oh My!: rational responses to emerging internet threats. IEEE Security and Privacy 2006 4 3 52 58 10.1109/MSP.2006.83 (Pubitemid 44144078)
    • (2006) IEEE Security and Privacy , vol.4 , Issue.3 , pp. 52-58
    • Schaffer, G.P.1
  • 10
    • 34047099327 scopus 로고    scopus 로고
    • Fast-moving Zombies: Botnets stay a step ahead of the fixes
    • DOI 10.1109/MIC.2007.32
    • Goth G., Fast-moving Zombies: botnets stay a step ahead of the fixes. IEEE Internet Computing 2007 11 2 7 9 2-s2.0-34047099327 10.1109/MIC.2007.32 (Pubitemid 46511102)
    • (2007) IEEE Internet Computing , vol.11 , Issue.2 , pp. 7-9
    • Goth, G.1
  • 11
    • 84882582017 scopus 로고    scopus 로고
    • An inside look at botnets
    • 10.1007/978-0-387-44599-18
    • Barford P., Yegneswaran V., An inside look at botnets. Malware Detection 2007 27 171 191 10.1007/978-0-387-44599-18
    • (2007) Malware Detection , vol.27 , pp. 171-191
    • Barford, P.1    Yegneswaran, V.2
  • 15
    • 56649088308 scopus 로고    scopus 로고
    • Proceedings of the 5th International Conference on the Quantitative Evaluation of Systems (QEST '08) September 2008 2-s2.0-56649088308 10.1109/QEST.2008.43
    • Van Ruitenbeek E., Sanders W. H., Modeling peer-to-peer botnets. Proceedings of the 5th International Conference on the Quantitative Evaluation of Systems (QEST '08) September 2008 307 316 2-s2.0-56649088308 10.1109/QEST.2008.43
    • Modeling Peer-to-peer Botnets , pp. 307-316
    • Van Ruitenbeek, E.1    Sanders, W.H.2
  • 16
    • 84856566954 scopus 로고    scopus 로고
    • Comparison of the mean-field approach and simulation in a peer-to-peer botnet case study
    • 10.1007/978-3-642-24749-111
    • Kolesnichenko A., Remke A., Boer P. T., Haverkort B. R., Comparison of the mean-field approach and simulation in a peer-to-peer botnet case study. Computer Performance Engineering 2011 6977 133 147 10.1007/978-3-642-24749-111
    • (2011) Computer Performance Engineering , vol.6977 , pp. 133-147
    • Kolesnichenko, A.1    Remke, A.2    Boer, P.T.3    Haverkort, B.R.4
  • 17
    • 79955775981 scopus 로고    scopus 로고
    • AntBot: Anti-pollution peer-to-peer botnets
    • 2-s2.0-79955775981 10.1016/j.comnet.2011.02.006
    • Yan G., Ha D. T., Eidenbenz S., AntBot: anti-pollution peer-to-peer botnets. Computer Networks 2011 55 8 1941 1956 2-s2.0-79955775981 10.1016/j.comnet.2011.02.006
    • (2011) Computer Networks , vol.55 , Issue.8 , pp. 1941-1956
    • Yan, G.1    Ha, D.T.2    Eidenbenz, S.3
  • 19
    • 80052789013 scopus 로고    scopus 로고
    • A novel computer virus model and its dynamics
    • 10.1016/j.nonrwa.2011.07.048 2846848 ZBL1238.34076
    • Ren J. G., Yang X. F., Zhu Q. Y., Yang L. X., Zhang C. M., A novel computer virus model and its dynamics. Nonlinear Analysis: Real World Applications 2012 13 1 376 384 10.1016/j.nonrwa.2011.07.048 2846848 ZBL1238.34076
    • (2012) Nonlinear Analysis: Real World Applications , vol.13 , Issue.1 , pp. 376-384
    • Ren, J.G.1    Yang, X.F.2    Zhu, Q.Y.3    Yang, L.X.4    Zhang, C.M.5
  • 20
    • 84863325044 scopus 로고    scopus 로고
    • Optimal control of computer virus under a delayed model
    • 10.1016/j.amc.2012.04.092 2944005
    • Zhu Q. Y., Yang X. F., Yang L. X., Zhang C. M., Optimal control of computer virus under a delayed model. Applied Mathematics and Computation 2012 218 23 11613 11619 10.1016/j.amc.2012.04.092 2944005
    • (2012) Applied Mathematics and Computation , vol.218 , Issue.23 , pp. 11613-11619
    • Zhu, Q.Y.1    Yang, X.F.2    Yang, L.X.3    Zhang, C.M.4
  • 21
    • 84861987353 scopus 로고    scopus 로고
    • Hopf bifurcation analysis of a delayed viral infection model in computer networks
    • 10.1016/j.mcm.2011.12.010
    • Feng L. P., Liao X. F., Li H. Q., Han Q., Hopf bifurcation analysis of a delayed viral infection model in computer networks. Mathematics and Computer Modeling 2012 56 167 179 10.1016/j.mcm.2011.12.010
    • (2012) Mathematics and Computer Modeling , vol.56 , pp. 167-179
    • Feng, L.P.1    Liao, X.F.2    Li, H.Q.3    Han, Q.4
  • 22
    • 84864933804 scopus 로고    scopus 로고
    • Propagation behavior of virus code in the situation that infected computers are connected to the Internet with possible probability
    • 693695 10.1155/2012/693695
    • Yang L. X., Yang X. F., Propagation behavior of virus code in the situation that infected computers are connected to the Internet with possible probability. Discrete Dynamics in Nature and Society 2012 2012 13 693695 10.1155/2012/693695
    • (2012) Discrete Dynamics in Nature and Society , vol.2012 , pp. 13
    • Yang, L.X.1    Yang, X.F.2
  • 25
    • 84864943499 scopus 로고    scopus 로고
    • Propagation of computer virus under human intervention: A dynamical model
    • 106950 10.1155/2012/106950
    • Gan C. Q., Yang X. F., Liu W. P., Zhu Q. Y., Zhang X. L., Propagation of computer virus under human intervention: a dynamical model. Discrete Dynamics in Nature and Society 2012 2012 8 106950 10.1155/2012/106950
    • (2012) Discrete Dynamics in Nature and Society , vol.2012 , pp. 8
    • Gan, C.Q.1    Yang, X.F.2    Liu, W.P.3    Zhu, Q.Y.4    Zhang, X.L.5
  • 26
    • 55949131751 scopus 로고    scopus 로고
    • Network virus-epidemic model with the point-to-group information propagation
    • 10.1016/j.amc.2008.09.025 2474981 ZBL1162.68404
    • Yuan H., Chen G. Q., Network virus-epidemic model with the point-to-group information propagation. Applied Mathematics and Computation 2008 206 1 357 367 10.1016/j.amc.2008.09.025 2474981 ZBL1162.68404
    • (2008) Applied Mathematics and Computation , vol.206 , Issue.1 , pp. 357-367
    • Yuan, H.1    Chen, G.Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.