메뉴 건너뛰기




Volumn 86, Issue 3, 2013, Pages 707-715

BotMosaic: Collaborative network watermark for the detection of IRC-based botnets

Author keywords

Botmaster traceback; Botnet detection; Network flow watermarking; Network security; Traffic analysis

Indexed keywords

BOTNETS; CLIENT ORGANIZATIONS; COLLABORATIVE NETWORK; ENCRYPTED TRAFFIC; LOW COSTS; NETWORK FLOWS; NETWORK TRAFFIC; STEPPING STONE; TRACEBACK; TRAFFIC ANALYSIS;

EID: 84872680683     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2012.11.005     Document Type: Article
Times cited : (23)

References (34)
  • 2
    • 71549132338 scopus 로고    scopus 로고
    • A distortion free watermark framework for relational databases
    • B. Shishkov, J. Cordeiro, A. Ranchordas, INSTICC Press Sofia, Bulgaria
    • S. Bhattacharya, and A. Cortesi A distortion free watermark framework for relational databases B. Shishkov, J. Cordeiro, A. Ranchordas, ICSOFT (2) 2009 INSTICC Press Sofia, Bulgaria 229 234
    • (2009) ICSOFT (2) , pp. 229-234
    • Bhattacharya, S.1    Cortesi, A.2
  • 3
    • 71549145624 scopus 로고    scopus 로고
    • A generic distortion free watermarking technique for relational databases
    • A. Prakash, I. Gupta, Springer Kolkata, India 10.1007/978-3-642-10772-6
    • S. Bhattacharya, and A. Cortesi A generic distortion free watermarking technique for relational databases A. Prakash, I. Gupta, ICISS. Vol. 5905 of Lecture Notes in Computer Science 2009 Springer Kolkata, India 252 264 10.1007/978-3-642-10772-6
    • (2009) ICISS. Vol. 5905 of Lecture Notes in Computer Science , pp. 252-264
    • Bhattacharya, S.1    Cortesi, A.2
  • 10
    • 85177693003 scopus 로고    scopus 로고
    • Rainbow: A robust and invisible non-blind watermark for network flows
    • A. Houmansadr, N. Kiyavash, and N. Borisov Rainbow: a robust and invisible non-blind watermark for network flows NDSS 2009
    • (2009) NDSS
    • Houmansadr, A.1    Kiyavash, N.2    Borisov, N.3
  • 12
    • 77649330399 scopus 로고    scopus 로고
    • Distortion-free watermarking scheme for wireless sensor networks
    • Y. Badr, S. Caballé, F. Xhafa, A. Abraham, B. Gros
    • I. Kamel, O. AlKoky, and A.A.A. Dakkak Distortion-free watermarking scheme for wireless sensor networks Y. Badr, S. Caballé, F. Xhafa, A. Abraham, B. Gros, INCoS. IEEE 2009 135 140 http://ieeexplore.ieee.org/xpl/ mostRecentIssue.jsp?punumber=5367992
    • (2009) INCoS. IEEE , pp. 135-140
    • Kamel, I.1    Alkoky, O.2    Dakkak, A.A.A.3
  • 15
    • 80052167664 scopus 로고    scopus 로고
    • Multi-flow attacks against network flow watermarking schemes
    • P. van Oorschot, USENIX Association, Berkeley CA, USA
    • N. Kiyavash, A. Houmansadr, and N. Borisov Multi-flow attacks against network flow watermarking schemes P. van Oorschot, USENIX Security Symposium 2008 USENIX Association, Berkeley CA, USA
    • (2008) USENIX Security Symposium
    • Kiyavash, N.1    Houmansadr, A.2    Borisov, N.3
  • 16
    • 58249139558 scopus 로고    scopus 로고
    • Distortion-free secret image sharing mechanism using modulus operator
    • MAY 5 10.1016/j.patcog.2008.09.014
    • P.Y. Lin, J.S. Lee, and C.C. Chang Distortion-free secret image sharing mechanism using modulus operator Pattern Recognition 42 May (5) 2009 886 895 10.1016/j.patcog.2008.09.014
    • (2009) Pattern Recognition , vol.42 , pp. 886-895
    • Lin, P.Y.1    Lee, J.S.2    Chang, C.C.3
  • 18
    • 0003894635 scopus 로고
    • Status: EXPERIMENTAL.; ftp://ftp.math.utah.edu/pub/rfc/rfc1459.txt
    • Oikarinen, J.; Reed, D.; 1993. RFC 1459: Internet Relay Chat Protocol. Status: EXPERIMENTAL. ftp://ftp.internic.net/rfc/rfc1459.txt, ftp://ftp.math.utah.edu/pub/rfc/rfc1459.txt.
    • (1993) RFC 1459: Internet Relay Chat Protocol
    • Oikarinen, J.1    Reed, D.2
  • 20
    • 34548314612 scopus 로고    scopus 로고
    • Tracing traffic through intermediate hosts that repacketize flows
    • DOI 10.1109/INFCOM.2007.80, 4215662, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • Y. Pyun, Y. Park, X. Wang, D.S. Reeves, and P. Ning Tracing traffic through intermediate hosts that repacketize flows. G. Kesidis, E. Modiano, R. Srikant, IEEE Conference on Computer Communications (INFOCOM). 2007 634 642 (Pubitemid 47334280)
    • (2007) Proceedings - IEEE INFOCOM , pp. 634-642
    • Pyun, Y.J.1    Park, Y.H.2    Wang, X.3    Reeves, D.S.4    Ning, P.5
  • 21
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • DOI 10.1145/1151659.1159947
    • A. Ramachandran, and N. Feamster Understanding the network-level behavior of spammers L. Rizzo, T.E. Anderson, N. McKeown, SIGCOMM 2006 ACM 291 302 (Pubitemid 44623735)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2
  • 24
    • 1642516070 scopus 로고    scopus 로고
    • The Honeynet Project: Trapping the hackers
    • L. Spitzner The Honeynet Project: trapping the hackers IEEE Security & Privacy Magazine 1 2 2003 15 23
    • (2003) IEEE Security & Privacy Magazine , vol.1 , Issue.2 , pp. 15-23
    • Spitzner, L.1
  • 25
    • 79952494106 scopus 로고    scopus 로고
    • Distortion free geometry based secret image sharing
    • 10.1016/j.procs.2010.12.119
    • G. Ulutas, M. Ulutas, and V.V. Nabiyev Distortion free geometry based secret image sharing Procedia CS 3 2011 721 726 10.1016/j.procs.2010.12.119
    • (2011) Procedia , vol.3 CS , pp. 721-726
    • Ulutas, G.1    Ulutas, M.2    Nabiyev, V.V.3
  • 28
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • DOI 10.1109/SP.2007.30, 4223219, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • X. Wang, S. Chen, and S. Jajodia Network flow watermarking attack on low-latency anonymous communication systems B. Pfitzmann, P. McDaniel, IEEE Symposium on Security and Privacy 2007 116 130 (Pubitemid 47432521)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 116-130
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 30
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • X. Wang, and D.S. Reeves Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays V. Atluri, ACM Conference on Computer and Communications Security 2003 ACM New York, NY, USA 20 29 (Pubitemid 40673785)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D.S.2
  • 31
    • 34548755641 scopus 로고    scopus 로고
    • DSSS-based flow marking technique for invisible traceback
    • DOI 10.1109/SP.2007.14, 4223211, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao DSSS-based flow marking technique for invisible traceback B. Pfitzmann, P. McDaniel, IEEE Symposium on Security and Privacy 2007 18 32 (Pubitemid 47432513)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 18-32
    • Yu, W.1    Fu, X.2    Graham, S.3    Xuan, D.4    Zhao, W.5
  • 32
    • 85084161090 scopus 로고    scopus 로고
    • Detecting stepping stones.
    • S. Bellovin, G. Rose, USENIX Association Berkeley, CA, USA
    • Y. Zhang, and V. Paxson Detecting stepping stones. S. Bellovin, G. Rose, USENIX Security Symposium 2000 USENIX Association Berkeley, CA, USA 171 184
    • (2000) USENIX Security Symposium , pp. 171-184
    • Zhang, Y.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.