메뉴 건너뛰기




Volumn 38, Issue 1, 2014, Pages 22-33

A botnet-based command and control approach relying on swarm intelligence

Author keywords

Ant colony optimization; Botnets; Command and control; Malware based management for homeland defense; Stigmergy; Swarm intelligence

Indexed keywords

ANT COLONY OPTIMIZATION; ARTIFICIAL INTELLIGENCE; BOTNET; COMPUTER CRIME; DISTRIBUTED COMPUTER SYSTEMS; FAULT TOLERANCE; MALWARE; NETWORK ARCHITECTURE;

EID: 84897599943     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2013.05.002     Document Type: Article
Times cited : (33)

References (31)
  • 1
    • 11244321948 scopus 로고    scopus 로고
    • Provably secure competitive routing against proactive byzantine adversaries via reinforcement learning
    • Technical Report, Version 1
    • Awerbuch B, Holmer D, Rubens H. Provably secure competitive routing against proactive byzantine adversaries via reinforcement learning. Technical Report, In JHU Tech Report Version 1; 2003.
    • (2003) JHU Tech Report
    • Awerbuch, B.1    Holmer, D.2    Rubens, H.3
  • 2
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • Barabási A-L, Albert R. Emergence of scaling in random networks. Science 1999;286 (5439):509-12.
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabási, A.-L.1    Albert, R.2
  • 6
    • 84859709381 scopus 로고    scopus 로고
    • An improved ant-based algorithm for the degree-constrained minimum spanning
    • Bui TN, Deng X, Zrncic CM. An improved ant-based algorithm for the degree-constrained minimum spanning. IEEE Transactions on evolutionary Computation 2012;16(2):266-77.
    • (2012) IEEE Transactions on Evolutionary Computation , vol.16 , Issue.2 , pp. 266-277
    • Bui, T.N.1    Deng, X.2    Zrncic, C.M.3
  • 7
    • 70350755355 scopus 로고    scopus 로고
    • Do you trust your phone?
    • Di Noia T, Buccafurri F, editors. E-commerce and web technologies. Berlin/Heidelberg: Springer
    • Castiglione A, De Prisco R, De Santis A. Do you trust your phone? In: Di Noia T, Buccafurri F, editors. E-commerce and web technologies. Lecture notes in computer science, vol. 5692. Berlin/Heidelberg: Springer; 2009. p. 50-61, http://dx.doi.org/10.1007/978-3-642-03964-5-6.
    • (2009) Lecture Notes in Computer Science , vol.5692 , pp. 50-61
    • Castiglione, A.1    De Prisco, R.2    De Santis, A.3
  • 21
    • 0002282741 scopus 로고
    • Food neophobia in wild and laboratory mice (mus musculus domesticus)
    • Kronenberger J, Medioni J. Food neophobia in wild and laboratory mice (mus musculus domesticus). Behavioural Processes 1985;11(1):53-9.
    • (1985) Behavioural Processes , vol.11 , Issue.1 , pp. 53-59
    • Kronenberger, J.1    Medioni, J.2
  • 22
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • Langner R. Stuxnet: dissecting a cyberwarfare weapon. IEEE Security and Privacy 2011;9(3):49-51.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 24
    • 0019280027 scopus 로고
    • Degree-constrained minimum spanning tree
    • Narula S, Ho C. Degree-constrained minimum spanning tree. Computers and Operations Research 1980;7(4):239-49.
    • (1980) Computers and Operations Research , vol.7 , Issue.4 , pp. 239-249
    • Narula, S.1    Ho, C.2
  • 25
    • 67649678799 scopus 로고    scopus 로고
    • Providing true end-to-end security in converged voice over IP infrastructures
    • Palmieri F, Fiore U. Providing true end-to-end security in converged voice over IP infrastructures. Computers and Security 2009;28(6):433-49, http://dx.doi.org/10.1016/j.cose.2009.01.004.
    • (2009) Computers and Security , vol.28 , Issue.6 , pp. 433-449
    • Palmieri, F.1    Fiore, U.2
  • 31
    • 59349084692 scopus 로고    scopus 로고
    • Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks
    • Zhang Z, Ho P-H. Janus: a dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks. Journal of Network and Computer Applications 2009;32(3):710-20, http://dx.doi.org/10.1016/j.jnca.2008.07.011.
    • (2009) Journal of Network and Computer Applications , vol.32 , Issue.3 , pp. 710-720
    • Zhang, Z.1    Ho, P.-H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.