메뉴 건너뛰기




Volumn , Issue , 2011, Pages 75-89

Botnets and cyber security: Battling online threats

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84887444640     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-60960-851-4.ch005     Document Type: Chapter
Times cited : (1)

References (52)
  • 4
    • 84899381719 scopus 로고    scopus 로고
    • Botnets: Hijacked computers in Sweden (No. PTS-ER, 2009, 11
    • Bergstrand, P., Borryd, K., Lindmark, S., & Slama, A. (2009). Botnets: Hijacked computers in Sweden (No. PTS-ER, 2009, 11.
    • (2009)
    • Bergstrand, P.1    Borryd, K.2    Lindmark, S.3    Slama, A.4
  • 5
    • 84899311752 scopus 로고    scopus 로고
    • How big is the botnet problem?
    • Retrieved March 27, 2010, from
    • Bort, J. (2007). How big is the botnet problem? Network World. Retrieved March 27, 2010, from http://www.networkworld.com/research/2007/070607-botnets-side.html
    • (2007) Network World
    • Bort, J.1
  • 7
    • 84899322768 scopus 로고    scopus 로고
    • CERT Coordination Center, Retrieved from
    • CERT Coordination Center. (2006). List of CSIRTs with national responsibility. Retrieved from http://www.cert.org/csirts/national/contact.html
    • (2006) List of CSIRTs with National Responsibility
  • 8
    • 84899176772 scopus 로고    scopus 로고
    • Cisco, Cisco ASA botnet traffic filter. Retrieved March 27, 2010, from
    • Cisco. (2009). Cisco ASA botnet traffic filter. Retrieved March 27, 2010, from http://www.cisco.com/en/US/prod/vpndevc/ps6032/ps6094/ps6120/botnet_index.html
    • (2009)
  • 9
    • 84881722592 scopus 로고    scopus 로고
    • Cisco, Retrieved March 27, 2010, from
    • Cisco. (2009). Infiltrating a botnet. Retrieved March 27, 2010, from http://www.cisco.com/web/about/security/intelligence/bots.html
    • (2009) Infiltrating a Botnet
  • 10
    • 84899335108 scopus 로고    scopus 로고
    • CNet News, Jan, InSecurity complex, Behind the China attacks on Google (FAQ). Retrieved from
    • CNet News. (Jan 2010). InSecurity complex, Behind the China attacks on Google (FAQ). Retrieved from http://news.cnet.com/8301-27080_3-10434721-245.html?tag=mncol;txt
    • (2010)
  • 11
    • 84899247699 scopus 로고    scopus 로고
    • Paper presented at the 6th Annual Security Research Associates Spring Growth Conference
    • Cole, A., Mellor, M., & Noyes, D. (2007). Botnets: The rise of the machines. Paper presented at the 6th Annual Security Research Associates Spring Growth Conference.
    • (2007) Botnets: The Rise of the Machines
    • Cole, A.1    Mellor, M.2    Noyes, D.3
  • 12
    • 85032598499 scopus 로고    scopus 로고
    • Common Malware Enumeration (CME), Retrieved from
    • Common Malware Enumeration (CME). (2007). Data list. Retrieved from http://cme.mitre.org/data/list.html
    • (2007) Data List
  • 14
    • 84868140159 scopus 로고    scopus 로고
    • Retrieved March 27, 2010, from
    • Cranton, T. (2010). Cracking down on botnets. Retrieved March 27, 2010, from http://microsoftontheissues.com/cs/blogs/mscorp/archive/2010/02/24/cracking-down-on-botnets.aspx
    • (2010) Cracking Down on Botnets
    • Cranton, T.1
  • 16
    • 84899260303 scopus 로고    scopus 로고
    • DKIM, Retrieved March 27, 2010, from
    • DKIM. (2009). DomainKeys identified mail (DKIM). Retrieved March 27, 2010, from http://www.dkim.org/
    • (2009) DomainKeys Identified Mail (DKIM)
  • 17
    • 84899367370 scopus 로고    scopus 로고
    • EU, Retrieved March 27, 2010, from
    • EU. (2008). About European Union. Retrieved March 27, 2010, from http://europa.eu/index_en.htm
    • (2008) About European Union
  • 18
    • 84899191997 scopus 로고    scopus 로고
    • F-Secure, Retrieved March 27, 2010, from
    • F-Secure. (2009). Email-Worm: W32/Waledac.A. Retrieved March 27, 2010, from http://www.f-se-cure.com/v-descs/email-worm_w32_waledac_a.shtml
    • (2009) Email-Worm: W32/Waledac.A
  • 19
    • 84899327027 scopus 로고    scopus 로고
    • F-Secure, Mydoom.M, Retrieved April 07, 2010, from
    • F-Secure. (2009). Mydoom.M. Retrieved April 07, 2010, from http://www.f-secure.com/v-descs/mydoom_m.shtml
    • (2009)
  • 20
    • 84899381383 scopus 로고    scopus 로고
    • freed0., Retrieved March 27, 2010, from
    • freed0. (2007). ASN/GeoLoc reports and what to do about them. Retrieved March 27, 2010, from http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20070111
    • (2007) ASN/GeoLoc Reports and What to Do About Them
  • 21
    • 38149073177 scopus 로고    scopus 로고
    • Badvertisements: Stealthy click-fraud with unwitting accessories
    • doi:10.1080/15567280601015598
    • Gandhi, M., Jakobsson, M., & Ratkiewicz, J. (2006). Badvertisements: Stealthy click-fraud with unwitting accessories. Journal of Digital Forensic Practice, 1(2). doi:10.1080/15567280601015598
    • (2006) Journal of Digital Forensic Practice , vol.1 , Issue.2
    • Gandhi, M.1    Jakobsson, M.2    Ratkiewicz, J.3
  • 24
    • 26844548971 scopus 로고    scopus 로고
    • Honeynet Project, Retrieved from
    • Honeynet Project. (2005). Know your enemy: GenII honeynets. Retrieved from http://old.hon-eynet.org/papers/gen2/
    • (2005) Know Your Enemy: GenII Honeynets
  • 25
    • 30644463214 scopus 로고    scopus 로고
    • Honeynet Project, Retrieved March 27, 2010, from
    • Honeynet Project. (2006). Know your enemy: Honeynets. Retrieved March 27, 2010, from http://old.honeynet.org/papers/honeynet/
    • (2006) Know Your Enemy: Honeynets
  • 26
    • 84899293407 scopus 로고    scopus 로고
    • IAB, Retrieved March 27, 2010, from
    • IAB. (2008). IAB documents and current activities. Retrieved March 27, 2010, from http://www.iab.org/documents/index.html
    • (2008) IAB Documents and Current Activities
  • 29
    • 84899263762 scopus 로고    scopus 로고
    • ITU, Retrieved March 27, 2010, from
    • ITU. (2010). About ITU. Retrieved March 27, 2010, from http://www.itu.int/net/about/#
    • (2010) About ITU
  • 30
    • 84899294835 scopus 로고    scopus 로고
    • Estonia gets respite from web attacks
    • Retrieved from
    • Lemos, R. (2007). Estonia gets respite from web attacks. Security Focus. Retrieved from http://www.securityfocus.com/brief/504
    • (2007) Security Focus
    • Lemos, R.1
  • 31
    • 77951447962 scopus 로고    scopus 로고
    • Paper presented at the Fourth International Conference on Innovative Computing, Information and Control (ICICIC)
    • Li, C., Jiang, W., & Zou, X. (2009). Botnet: Survey and case study. Paper presented at the Fourth International Conference on Innovative Computing, Information and Control (ICICIC).
    • (2009) Botnet: Survey and Case Study
    • Li, C.1    Jiang, W.2    Zou, X.3
  • 32
    • 84899223915 scopus 로고    scopus 로고
    • MAAWG, Retrieved March 27, 2010, from
    • MAAWG. (2010). MAAWG published documents. Retrieved March 27, 2010, from http://www.maawg.org/published-documents
    • (2010) MAAWG Published Documents
  • 33
    • 84875214953 scopus 로고    scopus 로고
    • Retrieved March 27, 2010, from
    • Messmer, E. (2009). America's 10 most wanted botnets. Retrieved March 27, 2010, from http://www.networkworld.com/news/2009/072209-botnets.html
    • (2009) America's 10 Most Wanted Botnets
    • Messmer, E.1
  • 35
    • 84899220688 scopus 로고    scopus 로고
    • Microsoft, Sender ID. Retrieved March 27, 2010, from
    • Microsoft. (2006). Sender ID. Retrieved March 27, 2010, from http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx
    • (2006)
  • 36
    • 84899384053 scopus 로고    scopus 로고
    • Microsoft, (n.d.), Retrieved March 27, 2010, from
    • Microsoft. (n.d.). Windows products. Retrieved March 27, 2010, from http://www.microsoft.com/windows/products/
    • Windows Products
  • 38
    • 84899396885 scopus 로고    scopus 로고
    • October, Paper presented at 2006 Virus Bulletin Conference (VB2006)
    • Myers, L. (2006, October). Aim for bot coordination. Paper presented at 2006 Virus Bulletin Conference (VB2006).
    • (2006) Aim for Bot Coordination
    • Myers, L.1
  • 39
    • 84899210650 scopus 로고    scopus 로고
    • National Infrastructure Security Co-Ordination Centre
    • National Infrastructure Security Co-Ordination Centre. (2004). Border gateway protocol.
    • (2004) Border Gateway Protocol
  • 40
    • 47849098249 scopus 로고    scopus 로고
    • Paper presented at 41st Annual IEEE International Carnahan Conference on Security Technology
    • Ono, K., Kawaishi, I., & Kamon, T. (2007). Trend of botnet activities. Paper presented at 41st Annual IEEE International Carnahan Conference on Security Technology.
    • (2007) Trend of Botnet Activities
    • Ono, K.1    Kawaishi, I.2    Kamon, T.3
  • 46
    • 84899398963 scopus 로고    scopus 로고
    • Symantec, Retrieved March 27, 2010, from
    • Symantec. (2007). W32.Randex.E. Retrieved March 27, 2010, from http://www.symantec.com/security_response/writeup.jsp?docid=2003-081213-3232-99
    • (2007) W32.Randex.E
  • 50
    • 85013740783 scopus 로고    scopus 로고
    • The Shadowserver Foundation, Retrieved March 27, 2010, from
    • The Shadowserver Foundation. (2007). Botnets. Retrieved March 27, 2010, from http://www.shadowserver.org/wiki/pmwiki.php/Information/Botnets#toc
    • (2007) Botnets
  • 51
    • 84899384543 scopus 로고    scopus 로고
    • The Sydney Morning Herald, Retrieved from
    • The Sydney Morning Herald. (2007). Cyber attacks force Estonian bank to close website. Retrieved from http://www.smh.com.au/news/breaking-news/cyber-attacks-force-estonian-bank-to-close-website/2007/05/16/1178995171916.html
    • (2007) Cyber Attacks Force Estonian Bank to Close Website
  • 52
    • 84899286926 scopus 로고    scopus 로고
    • Trendmicro, Retrieved from
    • Trendmicro. (2003). POLYBOOT-B*. Retrieved from http://threatinfo.trendmicro.com/vinfo/vi-rusencyclo/default5.asp?VName=POLYBOOT-B*
    • (2003) POLYBOOT-B*


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.