메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Entelecheia: Detecting P2P botnets in their waiting stage

Author keywords

anomaly detection; botnet; community; graph mining; security

Indexed keywords

ANOMALY DETECTION; BOTNET; COMMUNITY; GRAPH-MINING; SECURITY;

EID: 84890840695     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (27)
  • 2
    • 84871510702 scopus 로고    scopus 로고
    • Mawi traffic archive. http://mawi.wide.ad.jp/mawi/samplepoint-B/20060303/ .
    • Mawi Traffic Archive
  • 3
    • 35348850600 scopus 로고    scopus 로고
    • An algorithm for anomaly-based botnet detection
    • July
    • BINKLEY, J. R., AND SINGH, S. An algorithm for anomaly-based botnet detection. In Proc. of USENIX SRUTl (July 2006).
    • (2006) Proc. of USENIX SRUTl
    • Binkley, J.R.1    Singh, S.2
  • 5
    • 78751473146 scopus 로고    scopus 로고
    • Friends of an enemy: Identifying local members of peer-to-peer botnets using mutual contacts
    • ACM
    • COSKUN, B ., DIETRICH, S., AND MEMON, N. Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. In Proc. of ACSAC 2010, ACM, pp. 131-140.
    • Proc. of ACSAC 2010 , pp. 131-140
    • Coskun, B.1    Dietrich, S.2    Memon, N.3
  • 6
    • 74049087026 scopus 로고    scopus 로고
    • Community detection in graphs
    • FORTUNATO, S. Community detection in graphs. Physics Reports 486, 3 (2010).
    • (2010) Physics Reports , vol.486 , pp. 3
    • Fortunato, S.1
  • 7
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • USENIX Association
    • Gu, G., PERDISCI, R., ZHANG, J., AND LEE, W. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proc. of Usenix Security 2008, USENIX Association, pp. 139-154.
    • Proc. of Usenix Security 2008 , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 8
    • 85061529860 scopus 로고    scopus 로고
    • Bothunter: Detecting mal ware infection through ids-driven dialog correlation
    • USENIX Association
    • Gu, G., PORRAS, P., YEGNESWARAN, V., FONG, M., AND LEE, W. Bothunter: Detecting mal ware infection through ids-driven dialog correlation. In Proc. of 16th USENIX Security Symposium (2007), USENIX Association, p. 12.
    • thUSENIX Security Symposium (2007) , pp. 12
    • Gu, G.1    Porras, P.2    Yegneswaran, V.3    Fong, M.4    Lee, W.5
  • 9
    • 85084097128 scopus 로고    scopus 로고
    • Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
    • HOLZ, T., STEINER, M., DAHL, F., BIERSACK, E., AND FREILlNG, F. Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm. In Proc. of LEET 2008.
    • (2008) Proc. of LEET
    • Holz, T.1    Steiner, M.2    Dahl, F.3    Biersack, E.4    Freillng, F.5
  • 11
    • 79955775579 scopus 로고    scopus 로고
    • Profiling-by-association: A resilient traffic profiling solution for the internet backbone
    • Dec
    • ILiOFOTOU, M., GALLAGHER, B ., ELiASSI-RAD, T., G., X., AND M., F. Profiling-by-association: A resilient traffic profiling solution for the internet backbone. In Proc. of ACM CoNEXT (Dec. 2010).
    • (2010) Proc. of ACM CoNEXT
    • Iliofotou, M.1    Gallagher, B.2    Eliassi-Rad, T.3
  • 14
    • 70449686700 scopus 로고    scopus 로고
    • Unveiling core networkwide communication patterns through application traffic activity graph decomposition
    • ACM
    • JIN, Y., SHARAFUDDIN, E., AND ZHANG, Z. Unveiling core networkwide communication patterns through application traffic activity graph decomposition. In Proc. of SIGMETRICS 2009 (2009), ACM, pp. 49-60.
    • (2009) Proc. of SIGMETRICS 2009 , pp. 49-60
    • Jin, Y.1    Sharafuddin, E.2    Zhang, Z.3
  • 17
  • 19
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • ROESCH, M. ET AL. Snort: Lightweight intrusion detection for networks. In Proc. of LISA (1999), pp. 229-238.
    • (1999) Proc. of LISA , pp. 229-238
    • Roesch, M.1
  • 20
    • 49049107082 scopus 로고    scopus 로고
    • Analysis of the storm and nugache trojans: P2p is here
    • STOVER, S., DITTRICH, D ., HERNANDEZ, J., AND DIETRICH, S. Analysis of the storm and nugache trojans: P2p is here. USENIX;login 32, 6 (2007), 2007-12.
    • (2007) USENIX;login , vol.32 , Issue.6 , pp. 2007-2012
    • Stover, S.1    Dittrich, D.2    Hernandez, J.3    Dietrich, S.4
  • 25
    • 77955861102 scopus 로고    scopus 로고
    • Are your hosts trading or plotting? Telling p2p file-sharing and bots apart
    • IEEE
    • YEN, T., AND REITER, M. Are your hosts trading or plotting? Telling p2p file-sharing and bots apart. In Proc. of ICDCS 2010, IEEE, pp. 241- 252.
    • (2010) Proc. of ICDCS , pp. 241-252
    • Yen, T.1    Reiter, M.2
  • 26
    • 80051935855 scopus 로고    scopus 로고
    • Detecting stealthy p2p botnets using statistical traffic fingerprints
    • IEEE
    • ZHANG, J., PERDISCI, R., LEE, W., SARFRAZ, U., AND Luo, X. Detecting stealthy p2p botnets using statistical traffic fingerprints. In Proc. of DSN (2011), IEEE.
    • (2011) Proc. of DSN
    • Zhang, J.1    Perdisci, R.2    Lee, W.3    Sarfraz, U.4    Luo, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.