메뉴 건너뛰기




Volumn , Issue , 2012, Pages 349-360

BotFinder: Finding bots in network traffic without deep packet inspection

Author keywords

Malware detection; NetFlow analysis; Security

Indexed keywords

BOT DETECTIONS; COMMAND-AND-CONTROL; CONTENT ANALYSIS; CONTROLLED ENVIRONMENT; DATA SETS; DEEP PACKET INSPECTION; DISTRIBUTED DENIAL OF SERVICE ATTACK; FALSE POSITIVE; HIGH DETECTION RATE; KEY FEATURE; MALWARE DETECTION; NETFLOWS; NETWORK TRAFFIC; ROOT CAUSE; SECURITY; SECURITY PROBLEMS; SIGNATURE-MATCHING;

EID: 84871993648     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2413176.2413217     Document Type: Conference Paper
Times cited : (167)

References (37)
  • 3
    • 85080378133 scopus 로고    scopus 로고
    • An algorithm for anomaly-based botnet detection
    • J. R. Binkley. An algorithm for anomaly-based botnet detection. In SRUTI, 2006.
    • (2006) SRUTI
    • Binkley, J.R.1
  • 4
    • 77953146322 scopus 로고    scopus 로고
    • Clues: An R package for nonparametric clustering based on local shrinking
    • 2
    • F. Chang, W. Qiu, R. H. Zamar, R. Lazarus, and X. Wang. clues: An R Package for Nonparametric Clustering Based on Local Shrinking. Journal of Statistical Software, 33(4):1-16, 2 2010.
    • (2010) Journal of Statistical Software , vol.33 , Issue.4 , pp. 1-16
    • Chang, F.1    Qiu, W.2    Zamar, R.H.3    Lazarus, R.4    Wang, X.5
  • 5
    • 77955158454 scopus 로고    scopus 로고
    • Cisco systems netflow services export version 9
    • Oct.
    • B. Claise. Cisco systems netflow services export version 9. RFC 3954, IETF, Oct. 2004.
    • (2004) RFC 3954, IETF
    • Claise, B.1
  • 6
    • 84888402098 scopus 로고    scopus 로고
    • The zombie roundup: Understanding, detecting, and disrupting botnets
    • E. Cooke, F. Jahanian, and D. McPherson. The Zombie roundup: understanding, detecting, and disrupting botnets. In SRUTI, 2005.
    • (2005) SRUTI
    • Cooke, E.1    Jahanian, F.2    McPherson, D.3
  • 7
    • 78751473146 scopus 로고    scopus 로고
    • Friends of an enemy: Identifying local members of peer-to-peer botnets using mutual contacts
    • B. Coskun, S. Dietrich, and N. Memon. Friends of An Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts. In ACSAC, 2010.
    • (2010) ACSAC
    • Coskun, B.1    Dietrich, S.2    Memon, N.3
  • 8
    • 70349240080 scopus 로고    scopus 로고
    • Ether: Malware analysis via hardware virtualization extensions
    • A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In ACM CCS, 2008.
    • (2008) ACM CCS
    • Dinaburg, A.1    Royal, P.2    Sharif, M.3    Lee, W.4
  • 9
    • 34547359214 scopus 로고    scopus 로고
    • Evading network anomaly detection systems: Formal reasoning and practical techniques
    • P. Fogla and W. Lee. Evading network anomaly detection systems: formal reasoning and practical techniques. In ACM CCS, 2006.
    • (2006) ACM CCS
    • Fogla, P.1    Lee, W.2
  • 11
    • 77952415099 scopus 로고    scopus 로고
    • An inquiry into the nature and causes of the wealth of internet miscreants
    • J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In ACM CCS, 2007.
    • (2007) ACM CCS
    • Franklin, J.1    Paxson, V.2    Perrig, A.3    Savage, S.4
  • 13
    • 33746632334 scopus 로고    scopus 로고
    • Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
    • F. Freiling, T. Holz, and G. Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks. In ESORICS, 2005.
    • (2005) ESORICS
    • Freiling, F.1    Holz, T.2    Wicherski, G.3
  • 15
    • 85093871360 scopus 로고    scopus 로고
    • Rishi: Identify bot contaminated hosts by IRC nickname evaluation
    • J. Goebel and T. Holz. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. In USENIX HotBots, 2007.
    • (2007) USENIX HotBots
    • Goebel, J.1    Holz, T.2
  • 16
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection. In USENIX Security, 2008.
    • (2008) USENIX Security
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 17
    • 85061529860 scopus 로고    scopus 로고
    • BotHunter: Detecting malware infection through IDS-driven dialog correlation
    • G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In USENIX Security, 2007.
    • (2007) USENIX Security
    • Gu, G.1    Porras, P.2    Yegneswaran, V.3    Fong, M.4    Lee, W.5
  • 18
    • 85175133385 scopus 로고    scopus 로고
    • BotSniffer: Detecting botnet command and control channels in network traffic
    • G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In NDSS, 2008.
    • (2008) NDSS
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 21
    • 84888316706 scopus 로고    scopus 로고
    • Jackstraws: Picking command and control connections from bot traffic
    • G. Jacob, R. Hund, C. Kruegel, and T. Holz. Jackstraws: Picking Command and Control Connections from Bot Traffic. USENIX Security, 2011.
    • (2011) USENIX Security
    • Jacob, G.1    Hund, R.2    Kruegel, C.3    Holz, T.4
  • 23
    • 0033167362 scopus 로고    scopus 로고
    • Gravitational clustering: A new approach based on the spatial distribution of the points
    • S. Kundu. Gravitational clustering: a new approach based on the spatial distribution of the points. Pattern Recognition, 32(7):1149-1160, 1999.
    • (1999) Pattern Recognition , vol.32 , Issue.7 , pp. 1149-1160
    • Kundu, S.1
  • 25
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: a System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 26
    • 84871993969 scopus 로고    scopus 로고
    • Misleading worm signature generators using deliberate noise injection
    • R. Perdisci, D. Dagon, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In IEEE S&P, 2006.
    • (2006) IEEE S&P
    • Perdisci, R.1    Dagon, D.2    Fogla, P.3    Sharif, M.4
  • 27
    • 84855844576 scopus 로고    scopus 로고
    • Behavioral clustering of http-based malware and signature generation using malicious network traces
    • R. Perdisci, W. Lee, and N. Feamster. Behavioral clustering of http-based malware and signature generation using malicious network traces. In USENIX NSDI, 2010.
    • (2010) USENIX NSDI
    • Perdisci, R.1    Lee, W.2    Feamster, N.3
  • 28
    • 79951480123 scopus 로고    scopus 로고
    • R Development Core Team R Foundation for Statistical Computing, Vienna, Austria
    • R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2010.
    • (2010) R: A Language and Environment for Statistical Computing
  • 29
    • 84871999581 scopus 로고    scopus 로고
    • A multifaceted approach to understanding the botnet phenomenon
    • M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In ACM IMC, 2006.
    • (2006) ACM IMC
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 31
    • 85084162557 scopus 로고    scopus 로고
    • Towards systematic evaluation of the evadability of bot/botnet detection methods
    • E. Stinson and J. C. Mitchell. Towards systematic evaluation of the evadability of bot/botnet detection methods. In USENIX WOOT, 2008.
    • (2008) USENIX WOOT
    • Stinson, E.1    Mitchell, J.C.2
  • 34
    • 34548255908 scopus 로고    scopus 로고
    • Clues: A non-parametric clustering method based on local shrinking
    • X. Wang, W. Qiu, and R. H. Zamar. Clues: A non-parametric clustering method based on local shrinking. Computational Statistics and Data Analysis, 52(1):286-298, 2007.
    • (2007) Computational Statistics and Data Analysis , vol.52 , Issue.1 , pp. 286-298
    • Wang, X.1    Qiu, W.2    Zamar, R.H.3
  • 35
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • C. Willems, T. Holz, and F. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE S&P, 2007.
    • (2007) IEEE S&P
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 37
    • 58449108281 scopus 로고    scopus 로고
    • Traffic aggregation for malware detection
    • T.-F. Yen and M. K. Reiter. Traffic Aggregation for Malware Detection. In DIMVA, 2008.
    • (2008) DIMVA
    • Yen, T.-F.1    Reiter, M.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.