메뉴 건너뛰기




Volumn 16, Issue 2, 2014, Pages 898-924

A Taxonomy of botnet behavior, detection, and defense

Author keywords

bot; bot family; botmaster; botnet; C C; complex event processing; cyberfraud; cyberwarfare; DDoS; DNS flux; fast flux service network; IP flux; spam; spambot; stepping stone

Indexed keywords

COMPLEX NETWORKS; INTERNET PROTOCOLS; NETWORK SECURITY;

EID: 84901245716     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2013.091213.00134     Document Type: Article
Times cited : (164)

References (162)
  • 2
    • 47949132450 scopus 로고    scopus 로고
    • Taxonomy of botnet threats
    • November
    • T. Micro, "Taxonomy of botnet threats," Micro, pp. 1-15, November 2006. [Online]. Available: http://tinyurl.com/c7mlsjo
    • (2006) Micro , pp. 1-15
    • Micro, T.1
  • 4
    • 84901222225 scopus 로고    scopus 로고
    • accessed 15-December-2011
    • J. Nazario, "Bot and botnet taxonomy," http://tinyurl.com/ 6bcthj, 2008, [Online; accessed 15-December-2011].
    • (2008) Bot and Botnet Taxonomy
    • Nazario, J.1
  • 10
    • 78349299834 scopus 로고    scopus 로고
    • Stuxnet, the real start of cyber warfare?
    • T. Chen, "Stuxnet, the real start of cyber warfare?" IEEE Network, vol. 24, no. 6, 2010.
    • (2010) IEEE Network , vol.24 , Issue.6
    • Chen, T.1
  • 11
    • 84855680528 scopus 로고    scopus 로고
    • The real face of koobface: The largest web 2. 0 botnet explained
    • J. Baltazar, J. Costoya, and R. Flores, "The real face of koobface: The largest web 2. 0 botnet explained," Trend Micro Threat Research, 2009. [Online]. Available: http://tinyurl.com/c95m86f
    • (2009) Trend Micro Threat Research
    • Baltazar, J.1    Costoya, J.2    Flores, R.3
  • 12
    • 84901222226 scopus 로고    scopus 로고
    • threatpost:The Kaspersky Lab Security News Service [Online; accessed 2-December-2011]
    • T. Werner, "The inside story of the kelihos botnet takedown," http://tinyurl.com/3gzmtzd, threatpost:The Kaspersky Lab Security News Service, 2011, [Online; accessed 2-December-2011].
    • (2011) The Inside Story of the Kelihos Botnet Takedown
    • Werner, T.1
  • 13
    • 49049107082 scopus 로고    scopus 로고
    • Analysis of the storm and nugache trojans: P2P is here
    • S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich, "Analysis of the storm and nugache trojans: P2P is here," in USENIX ;login, vol. 32, no. 6, 2007.
    • (2007) USENIX ;Login , vol.32 , Issue.6
    • Stover, S.1    Dittrich, D.2    Hernandez, J.3    Dietrich, S.4
  • 15
    • 84882582017 scopus 로고    scopus 로고
    • An Inside Look at Botnets
    • M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Eds. Boston, MA: Springer US ch. 8
    • P. Barford and V. Yegneswaran, "An Inside Look at Botnets," in Malware Detection, ser. Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Eds. Boston, MA: Springer US, 2007, vol. 27, ch. 8, pp. 171-191. [Online]. Available: http://dx.doi.org/10.1007/978-0- 387-44599-1\-8
    • (2007) Malware Detection, Ser. Advances in Information Security , vol.27 , pp. 171-191
    • Barford, P.1    Yegneswaran, V.2
  • 16
  • 17
    • 70249138620 scopus 로고    scopus 로고
    • [Online; accessed 15-December-2011]
    • J. Stewart, "Phatbot trojan analysis," http://tinyurl.com/ 9srw4gh, 2004, [Online; accessed 15-December-2011].
    • (2004) Phatbot Trojan Analysis
    • Stewart, J.1
  • 28
    • 77950880711 scopus 로고    scopus 로고
    • Tracking ghostnet: Investigating a cyber espionage network
    • R. Deibert, A. Manchanda, R. Rohozinski, N. Villeneuve, and G. Walton, "Tracking ghostnet: Investigating a cyber espionage network," Network, vol. JR02-2009, no. JR02-2009, p. 53, 2009. [Online]. Available: http://tinyurl.com/d5q3cj
    • (2009) Network , vol.JR02-2009 , Issue.JR02-2009 , pp. 53
    • Deibert, R.1    Manchanda, A.2    Rohozinski, R.3    Villeneuve, N.4    Walton, G.5
  • 36
    • 84901198959 scopus 로고    scopus 로고
    • CWSandBox Online; accessed 15-December-2011]
    • CWSandBox, "Cwsandbox," http://mwanalysis.org/, [Online; accessed 15-December-2011].
    • Cwsandbox
  • 39
    • 77952225507 scopus 로고    scopus 로고
    • Master's thesis, Technical University of Denmark, Kongens Lyngby, Denmark
    • L. T. Borup, "Peer-to-peer botnets: A case study on waledac," Master's thesis, Technical University of Denmark, Kongens Lyngby, Denmark, 2009.
    • (2009) Peer-to-peer Botnets: A Case Study on Waledac
    • Borup, L.T.1
  • 41
  • 42
    • 84872517076 scopus 로고    scopus 로고
    • Tor Online; accessed 20-December-2011]
    • Tor, "Tor: Anonymity online," https://www.torproject.org/, [Online; accessed 20-December-2011].
    • Tor: Anonymity Online
  • 43
    • 84881239386 scopus 로고    scopus 로고
    • Resilient botnet command and control with tor
    • Las Vegas, Nevada, USA
    • D. Brown, "Resilient botnet command and control with tor." Presented at DEF CON 18, Las Vegas, Nevada, USA, 2010.
    • (2010) Presented at DEF CON 18
    • Brown, D.1
  • 44
    • 84901222223 scopus 로고    scopus 로고
    • Tor Online; accessed 12-November-2012]
    • Tor, "Tor hidden services," https://www.torproject.org/docs/ hidden-services.html.en, [Online; accessed 12-November-2012].
    • Tor Hidden Services
  • 46
    • 84901222224 scopus 로고    scopus 로고
    • US-Cert Online; accessed 15-December-2011]
    • US-Cert, "Malware tunneling in ipv6." http://tinyurl.com/ 6zvv568, 2005, [Online; accessed 15-December-2011].
    • (2005) Malware Tunneling in ipv6
  • 48
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network trafficfor protocol-and structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering analysis of network trafficfor protocol-and structure-independent botnet detection," in Usenix Security Symposium, 2008.
    • (2008) Usenix Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 51
    • 0003539116 scopus 로고    scopus 로고
    • Snort-lightweight intrusion detection fornetworks
    • M. Roesch, "Snort-lightweight intrusion detection fornetworks," in Proc. USENIX LISA'99), 1999.
    • (1999) Proc. USENIX LISA'99)
    • Roesch, M.1
  • 58
    • 79958741784 scopus 로고    scopus 로고
    • Inter-domain stealthy port scan detection through complex event processing
    • New York, NY, USA: ACM
    • L. Aniello, G. Lodi, and R. Baldoni, "Inter-domain stealthy port scan detection through complex event processing," in Proc. the 13th European Workshop on Dependable Computing, ser. EWDC '11. New York, NY, USA: ACM, 2011, pp. 67-72. [Online]. Available: http://doi.acm.org/10.1145/1978582. 1978597
    • (2011) Proc the 13th European Workshop on Dependable Computing, Ser. EWDC '11 , pp. 67-72
    • Aniello, L.1    Lodi, G.2    Baldoni, R.3
  • 73
    • 58149145577 scopus 로고    scopus 로고
    • Detection and Mitigation of Fast-Flux Service Networks
    • San Diego, CA, USA, Feb.
    • T. Holz, C. Gorecki, K. Rieck, and F. Freiling, "Detection and Mitigation of Fast-Flux Service Networks," in Proc. NDSS 2008, San Diego, CA, USA, Feb. 2008. [Online]. Available: http://tinyurl.com/9q64vk5
    • (2008) Proc. NDSS 2008
    • Holz, T.1    Gorecki, C.2    Rieck, K.3    Freiling, F.4
  • 75
    • 84855658564 scopus 로고    scopus 로고
    • Detecting malware's failover c&c strategies with squeeze
    • R. H. Zakon, J. P. McDermott, and M. E. Locasto, Eds. ACM
    • M. Neugschwandtner, P. M. Comparetti, and C. Platzer, "Detecting malware's failover c&c strategies with squeeze." in ACSAC, R. H. Zakon, J. P. McDermott, and M. E. Locasto, Eds. ACM, 2011, pp. 21-30. [Online]. Available: http://tinyurl.com/9wz2uvj
    • (2011) ACSAC , pp. 21-30
    • Neugschwandtner, M.1    Comparetti, P.M.2    Platzer, C.3
  • 77
    • 84881159206 scopus 로고    scopus 로고
    • Provex: Detecting botnets with encrypted command and control channels
    • C. Rossow and C. J. Dietrich, "Provex: Detecting botnets with encrypted command and control channels," in DIMVA, 2013, pp. 21-40.
    • (2013) DIMVA , pp. 21-40
    • Rossow, C.1    Dietrich, C.J.2
  • 78
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • T. Nguyen and G. Armitage, "A survey of techniques for internet traffic classification using machine learning," IEEE Commun. Surveys Tutorials, vol. 10, no. 4, pp. 56-76, 2008. [Online]. Available: http://tinyurl.com/9hpoa3d
    • (2008) IEEE Commun. Surveys Tutorials , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.1    Armitage, G.2
  • 80
  • 82
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. X. Song and A. Perrig, "Advanced and authenticated marking schemes for ip traceback," in IEEE INFOCOM, 2001, pp. 878-886. (Pubitemid 32478418)
    • (2001) Proceedings - IEEE INFOCOM , vol.2 , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 86
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against ddos attacks
    • A. Yaar, A. Perrig, and D. Song, "Pi: A path identification mechanism to defend against ddos attacks," in IEEE Symposium on Security and Privacy, 2003, pp. 93-107.
    • (2003) IEEE Symposium on Security and Privacy , pp. 93-107
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 88
    • 0034775309 scopus 로고    scopus 로고
    • Hash-based IP traceback
    • DOI 10.1145/964723.383060
    • A. C. Snoeren, "Hash-based ip traceback," Computer Communication Review, vol. 31, pp. 3-14, 2001. (Pubitemid 32981950)
    • (2001) Computer Communication Review , vol.31 , Issue.4 , pp. 3-14
    • Snoeren, A.C.1
  • 89
    • 0029232080 scopus 로고
    • Holding intruders accountable on the internet
    • Washington, DC, USA: IEEE Computer Society
    • S. Staniford-Chen and L. T. Heberlein, "Holding intruders accountable on the internet," in Proc. 1995 IEEE Symposium on Security and Privacy, ser. SP '95. Washington, DC, USA: IEEE Computer Society, 1995, pp. 39-. [Online]. Available: http://dl.acm.org/citation. cfm?id=882491.884246
    • (1995) Proc. 1995 IEEE Symposium on Security and Privacy, Ser. SP '95 , pp. 39
    • Staniford-Chen, S.1    Heberlein, L.T.2
  • 95
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • X. Wang and D. S. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays," in Proc. 10th ACM conference on Computer and communications security, ser. CCS '03. New York, NY, USA: ACM, 2003, pp. 20-29. [Online]. Available: http://doi.acm.org/10.1145/948109.948115 (Pubitemid 40673785)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D.S.2
  • 104
    • 84901222207 scopus 로고    scopus 로고
    • Damballa Online; accessed 12-December-2011]
    • Damballa, "Damballa::homepage," http://www.damballa.com/, [Online; accessed 12-December-2011].
    • Damballa::homepage
  • 107
    • 36949007580 scopus 로고    scopus 로고
    • Cent, five cent, ten cent, dollar: Hitting botnets where it really hurts
    • New York, NY, USA: ACM
    • R. Ford and S. Gordon, "Cent, five cent, ten cent, dollar: hitting botnets where it really hurts," in Proc. 2006 Workshop on New Security Paradigms (NSPW'06). New York, NY, USA: ACM, 2007, p. 310.
    • (2007) Proc. 2006 Workshop on New Security Paradigms (NSPW'06) , pp. 310
    • Ford, R.1    Gordon, S.2
  • 108
    • 84901222208 scopus 로고    scopus 로고
    • URIBL Online; accessed 12-December-2011]
    • URIBL, "uribl-website," http://www.uribl.com/, [Online; accessed 12-December-2011].
    • Uribl-website
  • 111
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and ddos problems
    • April
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the dos and ddos problems," ACM Comput. Surv., vol. 39, April 2007.
    • (2007) ACM Comput. Surv. , vol.39
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 114
    • 84899293742 scopus 로고    scopus 로고
    • A.-P. E. C. AEC Dec Online; accessed 10-December-2011]
    • A.-P. E. C. AEC, "Guide on Policy and Technical Approaches against Botnet," http://tinyurl.com/9b68qmj, Dec 2008, [Online; accessed 10-December-2011].
    • (2008) Guide on Policy and Technical Approaches Against Botnet
  • 116
    • 23944463649 scopus 로고    scopus 로고
    • The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
    • SIGITE 2004 - IT Education - The State of the Art
    • G. L. Orgill, G. W. Romney, M. G. Bailey, and P. M. Orgill, "The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems," in Proc. 5th conference on Information technology education, ser. CITC5 '04. New York, NY, USA: ACM, 2004, pp. 177-181. (Pubitemid 41190110)
    • (2004) SIGITE 2004 Conference , pp. 177-181
    • Orgill, G.L.1    Romney, G.W.2    Bailey, M.G.3    Orgill, P.M.4
  • 117
    • 84901222212 scopus 로고    scopus 로고
    • Common best practices for mitigating large scale bot infections in residential networks
    • july
    • N. Mody, M. O'Reirdan, S. Masiello, and J. Zebek, "Common best practices for mitigating large scale bot infections in residential networks," MAAWG, july 2009.
    • (2009) MAAWG
    • Mody, N.1    O'Reirdan, M.2    Masiello, S.3    Zebek, J.4
  • 125
    • 84901222198 scopus 로고    scopus 로고
    • Online; accessed 15-December-2011]
    • K. Bong and J. Brozyck, "Managing large botnets," http://tinyurl.com/blcuxbo, 2007, [Online; accessed 15-December-2011].
    • (2007) Managing Large Botnets
    • Bong, K.1    Brozyck, J.2
  • 130
    • 85084162557 scopus 로고    scopus 로고
    • Towards systematic evaluation of the evadability of bot/botnet detection methods
    • Berkeley, CA, USA: USENIX Association
    • E. Stinson and J. C. Mitchell, "Towards systematic evaluation of the evadability of bot/botnet detection methods," in Proc. 2nd conference on USENIX Workshop on offensive technologies. Berkeley, CA, USA: USENIX Association, 2008, pp. 5:1-5:9. [Online]. Available: http://dl.acm.org/citation. cfm?id=1496702.1496707
    • (2008) Proc. 2nd Conference on USENIX Workshop on Offensive Technologies , pp. 51-59
    • Stinson, E.1    Mitchell, J.C.2
  • 131
    • 84898468370 scopus 로고    scopus 로고
    • Survey on network-based botnet detection methods
    • Jun.
    • S. García, A. Zunino, and M. Campo, "Survey on network-based botnet detection methods," Security Comm. Networks, p. n/a, Jun. 2013. [Online]. Available: http://dx.doi.org/10.1002/sec.800
    • (2013) Security Comm. Networks
    • García, S.1    Zunino, A.2    Campo, M.3
  • 134
    • 84881289371 scopus 로고    scopus 로고
    • Survey on botnet: Its architecture, detection, prevention and mitigation
    • I. Ullah, N. Khan, and H. A. Aboalsamh, "Survey on botnet: Its architecture, detection, prevention and mitigation," in ICNSC, 2013, pp. 660-665.
    • (2013) ICNSC , pp. 660-665
    • Ullah, I.1    Khan, N.2    Aboalsamh, H.A.3
  • 138
    • 84872102390 scopus 로고    scopus 로고
    • Disclosure: Detecting botnet command and control servers through large-scale netflow analysis
    • L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel, "Disclosure: Detecting botnet command and control servers through large-scale netflow analysis," in ACSAC, 2012. [Online]. Available: http://www.iseclab.org/papers/disclosure.pdf
    • (2012) ACSAC
    • Bilge, L.1    Balzarotti, D.2    Robertson, W.3    Kirda, E.4    Kruegel, C.5
  • 139
    • 85032409436 scopus 로고    scopus 로고
    • SecurityFocus Online; accessed 12-November-2012]
    • SecurityFocus, "Zeus botnet finds hold in amazon cloud," http://www.securityfocus.com/brief/1046, 2009, [Online; accessed 12-November-2012].
    • (2009) Zeus Botnet Finds Hold in Amazon Cloud
  • 140
    • 84901222200 scopus 로고    scopus 로고
    • Who needs botnets if you have google?
    • Johannesburg, South Africa
    • I. Burke, "Who needs botnets if you have google?" Presented at ZaCon2, Johannesburg, South Africa, 2010.
    • (2010) Presented at ZaCon2
    • Burke, I.1
  • 141
    • 80052596005 scopus 로고    scopus 로고
    • Botclouds-the future of cloud-based botnets
    • F. Leymann, I. Ivanov, M. van Sinderen, and B. Shishkov, Eds. SciTePress
    • K. P. Clark, M. Warnier, and F. M. T. Brazier, "Botclouds-the future of cloud-based botnets," in CLOSER, F. Leymann, I. Ivanov, M. van Sinderen, and B. Shishkov, Eds. SciTePress, 2011, pp. 597-603. [Online]. Available: http://tinyurl.com/c6cqkkd
    • (2011) CLOSER , pp. 597-603
    • Clark, K.P.1    Warnier, M.2    Brazier, F.M.T.3
  • 142
  • 144
    • 84870927918 scopus 로고    scopus 로고
    • Symantec Online; accessed 12-November-2012]
    • Symantec, "Android.bmaster: A million-dollar mobile botnet," http://tinyurl.com/a4bdljv, 2012, [Online; accessed 12-November-2012].
    • (2012) Android.bmaster: A Million-dollar Mobile Botnet
  • 145
    • 84901241011 scopus 로고    scopus 로고
    • Online; accessed 12-November-2012]
    • K. Inc., "Irc bot for android." http://tinyurl.com/7xrmlcb, 2012, [Online; accessed 12-November-2012].
    • (2012) Irc Bot for Android
    • Inc, K.1
  • 147
    • 84901222202 scopus 로고    scopus 로고
    • Micorsoft June [Online; accessed 1-Aug-2012]
    • Micorsoft, "Flame malware collision attack explained," http://tinyurl.com/dxxlb5j, June 2012, [Online; accessed 1-Aug-2012].
    • (2012) Flame Malware Collision Attack Explained
  • 148
    • 84889012386 scopus 로고    scopus 로고
    • L. of Cryptography of Systems Security (CrySyS) October [Online; accessed 1-Aug-2012]
    • L. of Cryptography of Systems Security (CrySyS), "Duqu: A stuxnet-like malware found in the wild, technical report," http://tinyurl.com/dxxlb5j, October 2011, [Online; accessed 1-Aug-2012].
    • (2011) Duqu: A Stuxnet-like Malware Found in the Wild, Technical Report
  • 149
    • 84892166017 scopus 로고    scopus 로고
    • September [Online; accessed 12-Dec-2012]
    • K. Lab, "Gauss:abnormal distribution," http://tinyurl.com/ 8p34yp7, September 2012, [Online; accessed 12-Dec-2012].
    • (2012) Gauss:abnormal Distribution
    • Lab, K.1
  • 150
    • 84883334973 scopus 로고    scopus 로고
    • August [Online; accessed 12-Dec-2012]
    • "Shamoon the wiper-copycats at work," http://tinyurl.com/ a9axwgx, August 2012, [Online; accessed 12-Dec-2012].
    • (2012) Shamoon the Wiper-copycats at Work
    • Lab, K.1
  • 151
    • 84901222203 scopus 로고    scopus 로고
    • Seculert July [Online; accessed 12-Dec-2012]
    • Seculert, "Mahdi-the cyberwar savior?" http://tinyurl.com/ brp64k4, July 2012, [Online; accessed 12-Dec-2012].
    • (2012) Mahdi-the Cyberwar Savior?
  • 152
    • 79959877302 scopus 로고    scopus 로고
    • InternetWorldStats Online; accessed 12-December-2011]
    • InternetWorldStats, "Internet growth statistics," http://www.internetworldstats.com/emarketing.htm, [Online; accessed 12-December-2011].
    • Internet Growth Statistics
  • 153
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • J. Stanton, K. Stam, P. Mastrangelo, and J. Jolton, "Analysis of end user security behaviors," Computers Security, vol. 24, no. 2, pp. 124-133, 2005. [Online]. Available: http://tinyurl.com/b3k6fg6 (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 154
    • 84901222204 scopus 로고    scopus 로고
    • January [Online; accessed 12-December-2011]
    • J. Fielding, "25% of all computers on botnets," http://tinyurl.com/9e7bdkr, January 2007, [Online; accessed 12-December-2011].
    • (2007) 25% of All Computers on Botnets
    • Fielding, J.1
  • 155
    • 84901222195 scopus 로고    scopus 로고
    • CIOinsight February Online; accessed 12-December-2011]
    • CIOinsight, "Botnets still a major threat, researchers say at rsa," http://tinyurl.com/cw5bypo, February 2011, [Online; accessed 12-December-2011].
    • (2011) Botnets Still A Major Threat, Researchers Say at Rsa
  • 159
    • 84901242100 scopus 로고    scopus 로고
    • February [Online; accessed 12-December-2011]
    • R. McMillan, "China cleans up spam problem," http://tinyurl.com/clnedlt, February 2011, [Online; accessed 12-December-2011].
    • (2011) China Cleans Up Spam Problem
    • McMillan, R.1
  • 161
    • 84901222190 scopus 로고    scopus 로고
    • TrendMicro Online; accessed 12-December-2011]
    • TrendMicro, "Rubotted," http://tinyurl.com/yd62cb8, [Online; accessed 12-December-2011].
    • Rubotted
  • 162
    • 84901222191 scopus 로고    scopus 로고
    • Bottleneck: A generalized, flexible and extensible framework for botnet defense
    • May 2012, poster Paper
    • N. R. Ramay, S. Khattak, A. A. Syed, and S. A. Khayam, "Bottleneck: A generalized, flexible and extensible framework for botnet defense," in IEEE Symposium on Security and Privacy, 2012, May 2012, poster Paper.
    • (2012) IEEE Symposium on Security and Privacy
    • Ramay, N.R.1    Khattak, S.2    Syed, A.A.3    Khayam, S.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.