메뉴 건너뛰기




Volumn , Issue , 2011, Pages 443-458

JACKSTRAWS: Picking command and control connections from bot traffic

Author keywords

[No Author keywords available]

Indexed keywords

BOTNET; LEARNING SYSTEMS; NETWORK SECURITY;

EID: 84888316706     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (96)

References (50)
  • 6
    • 42149142497 scopus 로고    scopus 로고
    • Challenging complexity of maximum common subgraph detection algorithms: A performance analysis of three algorithms on a wide database of graphs
    • D. Conte, P. Foggia, and M. Vento. Challenging complexity of maximum common subgraph detection algorithms: A performance analysis of three algorithms on a wide database of graphs. Journal of Graph Algorithms & Applications, 11(1), 2007.
    • (2007) Journal of Graph Algorithms & Applications , vol.11 , Issue.1
    • Conte, D.1    Foggia, P.2    Vento, M.3
  • 10
    • 34547359214 scopus 로고    scopus 로고
    • Evading network anomaly detection systems: Formal reasoning and practical techniques
    • P. Fogla and W. Lee. Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques. In ACM Conf. Computer & Communications Security (CCS), 2006.
    • (2006) ACM Conf. Computer & Communications Security (CCS)
    • Fogla, P.1    Lee, W.2
  • 16
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In USENIX Security Symp., 2008.
    • (2008) USENIX Security Symp.
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 20
    • 85076497432 scopus 로고    scopus 로고
    • International Secure Systems Lab
    • International Secure Systems Lab. Anubis: Analyzing Unknown Binaries. http://anubis.iseclab.org, 2011.
    • (2011) Anubis: Analyzing Unknown Binaries
  • 21
    • 70349995569 scopus 로고    scopus 로고
    • Functional polymorphic engines: Formalisation, implementation and use cases
    • G. Jacob, E. Filiol, and H. Debar. Functional polymorphic engines: Formalisation, implementation and use cases. Journal in Computer Virology, 5(3):247-261, 2009.
    • (2009) Journal in Computer Virology , vol.5 , Issue.3 , pp. 247-261
    • Jacob, G.1    Filiol, E.2    Debar, H.3
  • 24
    • 0038163983 scopus 로고    scopus 로고
    • Technical Report 02-017, University of Minnesota
    • G. Karypis. CLUTO - A Clustering Toolkit. Technical Report 02-017, University of Minnesota, 2003.
    • (2003) CLUTO - A Clustering Toolkit
    • Karypis, G.1
  • 25
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In USENIX Security Symp., 2004.
    • (2004) USENIX Security Symp
    • Kim, H.-A.1    Karp, B.2
  • 29
    • 33751064824 scopus 로고    scopus 로고
    • Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
    • Z. Li, M. Sanghi, Y. Chen, M.-Y. Kao, and B. Chavez. Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. In IEEE Symp. Security & Privacy, 2006.
    • (2006) IEEE Symp. Security & Privacy
    • Li, Z.1    Sanghi, M.2    Chen, Y.3    Kao, M.-Y.4    Chavez, B.5
  • 31
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • J. Newsom, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures for Polymorphic Worms. In IEEE Symp. Security & Privacy, 2005.
    • (2005) IEEE Symp. Security & Privacy
    • Newsom, J.1    Karp, B.2    Song, D.3
  • 38
    • 77955182005 scopus 로고    scopus 로고
    • All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
    • E. J. Schwartz, T. Avgerinos, and D. Brumley. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). In IEEE Symp. Security & Privacy, 2010.
    • (2010) IEEE Symp. Security & Privacy
    • Schwartz, E.J.1    Avgerinos, T.2    Brumley, D.3
  • 44
    • 34047110218 scopus 로고    scopus 로고
    • Cwsandbox: Towards automated dynamic binary analysis
    • C. Willems, T. Holz, and F. Freiling. CWSandbox: Towards Automated Dynamic Binary Analysis. IEEE Security & Privacy, 5(2), 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 47


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.