메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Feature selection for detection of peer-to-peer botnet traffic

Author keywords

botnet; classification; feature selection; machine learning; peer to peer

Indexed keywords

BAYESIAN NETWORK CLASSIFIERS; BOTNET; COMPARISON OF PERFORMANCE; FEATURE SELECTION ALGORITHM; INTRUSION DETECTION SYSTEMS; MACHINE LEARNING TECHNIQUES; NAVE BAYES CLASSIFIERS; PEER TO PEER;

EID: 84888150566     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2522548.2523133     Document Type: Conference Paper
Times cited : (20)

References (34)
  • 1
    • 84888174169 scopus 로고    scopus 로고
    • article available online: Accessed on 1stJuly 2013
    • Citadel and zeus. article available online:. https://www.botnets.fr/ index.php/Citadel-ZeuS-bot. Accessed on 1stJuly 2013.
    • Citadel and Zeus
  • 2
    • 84888184171 scopus 로고    scopus 로고
    • http:// Accessed on 10 May 2013
    • Open malware website:. http://http://openmalware.org/. Accessed on 10 May 2013.
  • 3
    • 84888160789 scopus 로고    scopus 로고
    • available online at:. Accessed on 18th April 2013
    • Wordpress botnet attack. available online at:. http://security. stackexchange.com/q/34482/9778. Accessed on 18th April 2013.
    • Wordpress Botnet Attack
  • 5
    • 84888169996 scopus 로고    scopus 로고
    • available online:. Accessed on 09 June 2013
    • BBC. Anonymous wikileaks supporters mull change in tactics. available online:. http://www.bbc.co.uk/news/mobile/technology-11968605. Accessed on 09 June 2013.
    • Anonymous Wikileaks Supporters Mull Change in Tactics
  • 6
    • 84888170939 scopus 로고    scopus 로고
    • website. Accessed on 7 May 2013
    • M. Bednarczyk. jnetpcap website. http://jnetpcap.com. Accessed on 7 May 2013.
    • Bednarczyk, M.1
  • 9
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • S. Chebrolu, A. Abraham, and J. P. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4):295-307, 2005.
    • (2005) Computers & Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 10
    • 0242302657 scopus 로고    scopus 로고
    • Consistency-based search in feature selection
    • M. Dash and H. Liu. Consistency-based search in feature selection. Artificial intelligence, 151(1):155-176, 2003.
    • (2003) Artificial Intelligence , vol.151 , Issue.1 , pp. 155-176
    • Dash, M.1    Liu, H.2
  • 11
  • 18
    • 84888172814 scopus 로고    scopus 로고
    • available online at:. Accessed on 18th April 2013
    • J. LeClaire. Wordpress sites attacked; may be prep for ddos barrage. available online at:. http://www.cio-today.com/news/WordPress-Web-Sites-Under- Attack/story.xhtml?story-id=033003176VMR. Accessed on 18th April 2013.
    • Wordpress Sites Attacked; May Be Prep for Ddos Barrage
    • LeClaire, J.1
  • 20
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection
    • Springer
    • M. V. Mahoney and P. K. Chan. An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection. In Recent Advances in Intrusion Detection, pages 220-237. Springer, 2003.
    • (2003) Recent Advances in Intrusion Detection , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 21
    • 84888166992 scopus 로고    scopus 로고
    • Mila. Contagio-dump blog. Accessed on 10 May 2013
    • Mila. Contagio-dump blog. http://www.contagiodump.blogspot.in. Accessed on 10 May 2013.
  • 24
    • 84881154550 scopus 로고    scopus 로고
    • Peerrush: Mining for unwanted p2p traffic
    • Detection of Intrusions and Malware, and Vulnerability Assessment, Springer Berlin Heidelberg
    • B. Rahbarinia, R. Perdisci, A. Lanzi, and K. Li. Peerrush: Mining for unwanted p2p traffic. In Detection of Intrusions and Malware, and Vulnerability Assessment, volume 7967 of Lecture Notes in Computer Science, pages 62-82. Springer Berlin Heidelberg, 2013.
    • (2013) Lecture Notes in Computer Science , vol.7967 , pp. 62-82
    • Rahbarinia, B.1    Perdisci, R.2    Lanzi, A.3    Li, K.4
  • 29
    • 3242765279 scopus 로고    scopus 로고
    • A bias-variance analysis of a real world learning problem: The coil challenge 2000
    • P. Van Der Putten and M. Van Someren. A bias-variance analysis of a real world learning problem: The coil challenge 2000. Machine Learning, 57(1-2):177-195, 2004.
    • (2004) Machine Learning , vol.57 , Issue.1-2 , pp. 177-195
    • Van Der Putten, P.1    Van Someren, M.2
  • 30
    • 33750283653 scopus 로고    scopus 로고
    • A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification
    • N. Williams, S. Zander, and G. Armitage. A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification. ACM SIGCOMM Computer Communication Review, 36(5):5-16, 2006.
    • (2006) ACM SIGCOMM Computer Communication Review , vol.36 , Issue.5 , pp. 5-16
    • Williams, N.1    Zander, S.2    Armitage, G.3
  • 34
    • 84888148987 scopus 로고    scopus 로고
    • available online at:. Accessed on 18th April 2013
    • C. York. Wordpress attacked by botnet in massive ddos onslaught. available online at:. http://www.huffingtonpost.co.uk/2013/04/15/wordpress- botnet-attack-n-3083819.html. Accessed on 18th April 2013.
    • Wordpress Attacked by Botnet in Massive Ddos Onslaught
    • York, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.