메뉴 건너뛰기




Volumn 15, Issue 11, 2014, Pages 943-983

Botnet detection techniques: review, future trends, and issues

Author keywords

Anomaly detection; Attack; Botnet detection; Defense; Network security; Taxonomy

Indexed keywords

COMPUTER CRIME; CRIME; DENIAL-OF-SERVICE ATTACK; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; NETWORK SECURITY; SECURITY OF DATA; TAXONOMIES;

EID: 84920872753     PISSN: 18691951     EISSN: 1869196X     Source Type: Journal    
DOI: 10.1631/jzus.C1300242     Document Type: Review
Times cited : (119)

References (217)
  • 2
    • 85006595081 scopus 로고    scopus 로고
    • Efficient generalized forensics framework for extraction and documentation of evidence from mobile devices
    • Ahmed, R., Dharaskar, R.V., Thakare, V.M., 2013. Efficient generalized forensics framework for extraction and documentation of evidence from mobile devices. Int. J. Enhanced Res. Manag. Comput. Appl., 2(1):1–7.
    • (2013) Int. J. Enhanced Res. Manag. Comput. Appl , vol.2 , Issue.1 , pp. 1-7
    • Ahmed, R.1    Dharaskar, R.V.2    Thakare, V.M.3
  • 3
    • 85084161642 scopus 로고    scopus 로고
    • Challenges in experimenting with botnet detection systems
    • Aviv, A.J., Haeberlen, A., 2011. Challenges in experimenting with botnet detection systems. USENIX 4th CSET Workshop, p.1–8.
    • (2011) USENIX 4th CSET Worksho , pp. 1-8
    • Aviv, A.J.1    Haeberlen, A.2
  • 5
    • 84882582017 scopus 로고    scopus 로고
    • An inside look at botnets
    • Barford, P., Yegneswaran, V., 2007. An inside look at botnets. In: Malware Detection. Springer, p.171–191. [doi:10.1007/978-0-387-44599-1_8]
    • (2007) Malware Detectio , pp. 171-191
    • Barford, P.1    Yegneswaran, V.2
  • 10
    • 84894646147 scopus 로고    scopus 로고
    • Network anomaly detection: methods, systems and tools
    • Bhuyan, M., Bhattacharyya, D., Kalita, J., 2013. Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor., 16(1):1–24.
    • (2013) IEEE Commun. Surv. Tutor , vol.16 , Issue.1 , pp. 1-24
    • Bhuyan, M.1    Bhattacharyya, D.2    Kalita, J.3
  • 12
    • 84935899275 scopus 로고    scopus 로고
    • Bu, Z., Bueno, P., Kashyap, R., et al., 2010. The New Era of Botnets. Available from ://.mcafee.com/in/resources/white-papers/wp-new-era-of-botnets.pdf [Accessed on Sept. 9, 2013].
    • (2010) The New Era of Botnet
    • Bu, Z.1    Bueno, P.2    Kashyap, R.3
  • 21
    • 71649112409 scopus 로고    scopus 로고
    • Worm virulence estimation for the containment of local worm outbreak
    • Choi, Y.H., Li, L., Liu, P., et al., 2010. Worm virulence estimation for the containment of local worm outbreak. Comput. & Secur., 29(1):104–123. [doi:10.1016/j.cose.2009.07.002]
    • (2010) Comput. & Secur , vol.29 , Issue.1 , pp. 104-123
    • Choi, Y.H.1    Li, L.2    Liu, P.3
  • 25
    • 84888402098 scopus 로고    scopus 로고
    • The zombie roundup: understanding, detecting, and disrupting botnets
    • Cooke, E., Jahanian, F., McPherson, D., 2005. The zombie roundup: understanding, detecting, and disrupting botnets. Proc. USENIX SRUTI Workshop, p.44.
    • (2005) Proc. USENIX SRUTI Worksho , pp. 44
    • Cooke, E.1    Jahanian, F.2    McPherson, D.3
  • 26
    • 78751473146 scopus 로고    scopus 로고
    • Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
    • Coskun, B., Dietrich, S., Memon, N., 2010. Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. Proc. 26th Annual Computer Security Applications Conf., p.131–140. [doi:10.1145/1920261.1920283]
    • (2010) Proc. 26th Annual Computer Security Applications Conf , pp. 131-140
    • Coskun, B.1    Dietrich, S.2    Memon, N.3
  • 28
    • 84881102082 scopus 로고    scopus 로고
    • A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
    • Creech, G., Hu, J., 2013. A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans. Comput., 1(1):1–23.
    • (2013) IEEE Trans. Comput , vol.1 , Issue.1 , pp. 1-23
    • Creech, G.1    Hu, J.2
  • 29
    • 77954910362 scopus 로고    scopus 로고
    • The Dorothy project: an open botnet analysis framework for automatic tracking and activity visualization
    • Cremonini, M., Riccardi, M., 2009. The Dorothy project: an open botnet analysis framework for automatic tracking and activity visualization. IEEE European Conf. on Computer Network Defense, p.52–54.
    • (2009) IEEE European Conf. on Computer Network Defens , pp. 52-54
    • Cremonini, M.1    Riccardi, M.2
  • 32
    • 84891429894 scopus 로고    scopus 로고
    • Modeling botnet propagation using time zones
    • Dagon, D., Zou, C.C., Lee, W., 2006. Modeling botnet propagation using time zones. NDSS, 6:2–13.
    • (2006) NDS , vol.6 , pp. 2-13
    • Dagon, D.1    Zou, C.C.2    Lee, W.3
  • 37
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Springer, Berlin Heidelberg:
    • Douceur, J.R., 2002. The sybil attack. In: Peer-to-Peer Systems. Springer Berlin Heidelberg, p.251–260. [doi:10.1007/3-540-45748-8_24]
    • (2002) Peer-to-Peer System , pp. 251-260
    • Douceur, J.R.1
  • 39
    • 35348815604 scopus 로고    scopus 로고
    • Identifying and discriminating between web and peer-to-peer traffic in the network core
    • Erman, J., Mahanti, A., Arlitt, M., et al., 2007. Identifying and discriminating between web and peer-to-peer traffic in the network core. Proc. 16th Int. Conf. on World Wide Web, p.883–892. [doi:10.1145/1242572.1242692]
    • (2007) Proc. 16th Int. Conf. on World Wide We , pp. 883-892
    • Erman, J.1    Mahanti, A.2    Arlitt, M.3
  • 47
    • 85006566409 scopus 로고    scopus 로고
    • Storm Worm Network Shrinks to About One-Tenth of Its Former Size
    • Francia, R., 2007. Storm Worm Network Shrinks to About One-Tenth of Its Former Size. Tech. Blorge. Com., p.10–21.
    • (2007) Tech. Blorge. Com , pp. 10-21
    • Francia, R.1
  • 48
    • 79956034020 scopus 로고    scopus 로고
    • BotTrack: tracking botnets using NetFlow and PageRank
    • François, J., Wang, S., Engel, T., 2011. BotTrack: tracking botnets using NetFlow and PageRank. NETWORKING, p.1–14.
    • (2011) NETWORKIN , pp. 1-14
    • François, J.1    Wang, S.2    Engel, T.3
  • 49
    • 33646054897 scopus 로고    scopus 로고
    • Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks
    • Freiling, F.C., Holz, T., Wicherski, G., 2005. Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks. Springer Berlin Heidelberg, p.319–335.
    • (2005) Springer Berlin Heidelber , pp. 319-335
    • Freiling, F.C.1    Holz, T.2    Wicherski, G.3
  • 50
    • 84874290041 scopus 로고    scopus 로고
    • On effective sampling techniques for host-based intrusion detection in MANET
    • Ge, L., Liu, H., Zhang, D., et al., 2012. On effective sampling techniques for host-based intrusion detection in MANET. IEEE Military Communications Conf., p.1–6.
    • (2012) IEEE Military Communications Conf , pp. 1-6
    • Ge, L.1    Liu, H.2    Zhang, D.3
  • 56
    • 85061529860 scopus 로고    scopus 로고
    • Bothunter: detecting malware infection through IDS-driven dialog correlation
    • Gu, G., Porras, P., Yegneswaran, V., et al., 2007. Bothunter: detecting malware infection through IDS-driven dialog correlation. Proc. 16th USENIX Security Symp., p.167–182.
    • (2007) Proc. 16th USENIX Security Symp , pp. 167-182
    • Gu, G.1    Porras, P.2    Yegneswaran, V.3
  • 58
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • Gu, G., Perdisci, R., Zhang, J., et al., 2008b. BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. USENIX Security Symp., p.139–154.
    • (2008) USENIX Security Symp , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3
  • 61
    • 85084097128 scopus 로고    scopus 로고
    • Measurements and mitigation of peer-to-peer-based botnets: a case study on Storm worm
    • Holz, T., Steiner, M., Dahl, F., et al., 2008. Measurements and mitigation of peer-to-peer-based botnets: a case study on Storm worm. LEET, 8(1):1–9.
    • (2008) LEE , vol.8 , Issue.1 , pp. 1-9
    • Holz, T.1    Steiner, M.2    Dahl, F.3
  • 64
    • 70449650721 scopus 로고    scopus 로고
    • Botnets as a vehicle for online crime
    • Ianelli, N., Hackworth, A., 2005. Botnets as a vehicle for online crime. CERT Coordination Center, 1(1):28.
    • (2005) CERT Coordination Cente , vol.1 , Issue.1 , pp. 28
    • Ianelli, N.1    Hackworth, A.2
  • 67
    • 85006566431 scopus 로고    scopus 로고
    • Janssen, C., 2011. Global Threat Bot (GTbot). Available from ://.techopedia.com/definition/59/global-threat-bot-gtbot [Accessed on May 6, 2014].
    • (2011) Global Threat Bot (GTbot
    • Janssen, C.1
  • 70
    • 79957629730 scopus 로고    scopus 로고
    • Identifying suspicious activities through DNS failure graph analysis
    • Jiang, N., Cao, J., Jin, Y., et al., 2010. Identifying suspicious activities through DNS failure graph analysis. 18th IEEE Int. Conf. on Network Protocols, p.144–153. [doi:10.1109/ICNP.2010.5762763]
    • (2010) 18th IEEE Int. Conf. on Network Protocol , pp. 144-153
    • Jiang, N.1    Cao, J.2    Jin, Y.3
  • 71
    • 70449412215 scopus 로고    scopus 로고
    • Botnet: classification, attacks, detection, tracing, and preventive measures
    • Jing, L., Yang, X., Kaveh, G., et al., 2009. Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP J. Wirel. Commun. Network., 2009: 1–11.
    • (2009) EURASIP J. Wirel. Commun. Network , vol.2009 , pp. 1-11
    • Jing, L.1    Yang, X.2    Kaveh, G.3
  • 72
    • 85076932663 scopus 로고    scopus 로고
    • Studying spamming botnets using Botlab
    • John, J.P., Moshchuk, A., Gribble, S.D., et al., 2009. Studying spamming botnets using Botlab. NSDI, p.291–306.
    • (2009) NSD , pp. 291-306
    • John, J.P.1    Moshchuk, A.2    Gribble, S.D.3
  • 76
    • 74049144153 scopus 로고    scopus 로고
    • Application entropy theory to detect new peer-to-peer botnet with multi-chart CUSUM
    • Kang, J., Zhang, J.Y., 2009. Application entropy theory to detect new peer-to-peer botnet with multi-chart CUSUM. IEEE 2nd Int. Symp. on Electronic Commerce and Security, p.470–474.
    • (2009) IEEE 2nd Int. Symp. on Electronic Commerce and Securit , pp. 470-474
    • Kang, J.1    Zhang, J.Y.2
  • 82
    • 84875216642 scopus 로고    scopus 로고
    • Keizer, G., 2008. Top Botnets Control 1M Hijacked Computers. Available from ://.computerworld.com/article/2536378/security0/top-botnets-control-1mhijacked-computers.html [Accessed on Sept. 8, 2013].
    • (2008) Top Botnets Control 1M Hijacked Computer
    • Keizer, G.1
  • 83
    • 85006640538 scopus 로고    scopus 로고
    • Kespersky, 2011. How to Detect and Remove the Rootkit TDL4. Available from ://infoaleph.wordpress.com/2011/07/03/como-detectar-y-borrar-el-rootkit-tdl4-tdssalureon/ [Accessed on June 20, 2013].
    • (2011) How to Detect and Remove the Rootkit TDL
    • Kespersky1
  • 91
    • 70350786131 scopus 로고    scopus 로고
    • A new method of P2P traffic identification based on support vector machine at the host level
    • Liu, F., Li, Z., Nie, Q., 2009. A new method of P2P traffic identification based on support vector machine at the host level. IEEE Int. Conf. on Information Technology and Computer Science, p.579–582.
    • (2009) IEEE Int. Conf. on Information Technology and Computer Scienc , pp. 579-582
    • Liu, F.1    Li, Z.2    Nie, Q.3
  • 92
    • 56649124591 scopus 로고    scopus 로고
    • BotTracer: execution-based bot-like malware detection
    • Liu, L., Chen, S., Yan, G., et al., 2008. BotTracer: execution-based bot-like malware detection. In: Information Security. Springer Berlin Heidelberg, p.97–113. [doi:10.1007/978-3-540-85886-7_7]
    • (2008) Information Securit , pp. 97-113
    • Liu, L.1    Chen, S.2    Yan, G.3
  • 101
    • 85006603709 scopus 로고    scopus 로고
    • Marry, W., 2010. Pushdo Botnet. Available from ://msmvps.com/blogs/harrywaldron/archive/2010/02/02/pushdo-botnet-new-ddos-attacks-on-major-web-sites.aspx.
    • (2010) Pushdo Botne
    • Marry, W.1
  • 104
    • 3042784584 scopus 로고    scopus 로고
    • Botnets: big and bigger
    • McCarty, B., 2003. Botnets: big and bigger. IEEE Secur. Priv., 1(4):87–90. [doi:10.1109/MSECP.2003.1219079]
    • (2003) IEEE Secur. Priv , vol.1 , Issue.4 , pp. 87-90
    • McCarty, B.1
  • 105
    • 85006625180 scopus 로고    scopus 로고
    • McMillan, R., 2009. Experts Bicker over Conficker Numbers. Available from ://news.techworld.com/security/114307/experts-bicker-over-conficker-numbers/ [Accessed on Oct. 14, 2013].
    • (2009) Experts Bicker over Conficker Number
    • McMillan, R.1
  • 108
    • 85006614255 scopus 로고    scopus 로고
    • The Rustock Botnet Spams Again
    • Miller, C., 2008. The Rustock Botnet Spams Again. SC Magazine, July 25.
    • (2008) SC Magazine, July 2
    • Miller, C.1
  • 114
    • 34547381069 scopus 로고    scopus 로고
    • Integrated visualization system for monitoring security in large-scale local area network
    • Mukosaka, S., Koike, H., 2007. Integrated visualization system for monitoring security in large-scale local area network. IEEE 6th Int. Asia-Pacific Symp. on Visualization, p.41–44.
    • (2007) IEEE 6th Int. Asia-Pacific Symp. on Visualizatio , pp. 41-44
    • Mukosaka, S.1    Koike, H.2
  • 118
    • 85059753615 scopus 로고    scopus 로고
    • BotGrep: finding P2P bots with structured graph analysis
    • Nagaraja, S., Mittal, P., Hong, C., et al., 2010. BotGrep: finding P2P bots with structured graph analysis. USENIX Security Symp., p.95–110.
    • (2010) USENIX Security Symp , pp. 95-110
    • Nagaraja, S.1    Mittal, P.2    Hong, C.3
  • 122
    • 85006627074 scopus 로고    scopus 로고
    • Paranoid, 2004. The Dangers of S. Available from ://.wilderssecurity.com/threads/the-dangers-ofs.31087/ [Accessed on Oct. 5, 2013].
    • (2004) The Dangers of
    • Paranoid1
  • 123
    • 47949094673 scopus 로고    scopus 로고
    • Towards practical framework for collecting and analyzing network-centric attacks
    • Paxton, N., Ahn, G.J., Chu, B., et al., 2007. Towards practical framework for collecting and analyzing network-centric attacks. IEEE Int. Conf. on Information Reuse and Integration, p.73–78. [doi:10.1109/IRI.2007.4296600]
    • (2007) IEEE Int. Conf. on Information Reuse and Integratio , pp. 73-78
    • Paxton, N.1    Ahn, G.J.2    Chu, B.3
  • 124
    • 77950795817 scopus 로고    scopus 로고
    • Detecting malicious flux service networks through passive analysis of recursive dns traces
    • Perdisci, R., Corona, I., Dagon, D., et al., 2009. Detecting malicious flux service networks through passive analysis of recursive dns traces. IEEE Annual Computer Security Applications Conf., p.311–320.
    • (2009) IEEE Annual Computer Security Applications Conf , pp. 311-320
    • Perdisci, R.1    Corona, I.2    Dagon, D.3
  • 125
    • 79951851851 scopus 로고    scopus 로고
    • Honeypot trace forensics: the observation viewpoint matters
    • Pham, V.H., Dacier, M., 2011. Honeypot trace forensics: the observation viewpoint matters. Fut. Gener. Comput. Syst., 27(5):539–546. [doi:10.1016/j.future.2010.06.004]
    • (2011) Fut. Gener. Comput. Syst , vol.27 , Issue.5 , pp. 539-546
    • Pham, V.H.1    Dacier, M.2
  • 131
  • 132
    • 84894040059 scopus 로고    scopus 로고
    • Bots & Botnet: an Overview
    • Puri, R., 2003. Bots & Botnet: an Overview. SANS Institute.
    • (2003) SANS Institut
    • Puri, R.1
  • 134
    • 85006639810 scopus 로고    scopus 로고
    • Raff, A., 2012. Ramnit Goes Social. Available from ://.seculert.com/blog/2012/01/ramnit-goes-social.html [Accessed on Dec. 5, 2013].
    • (2012) Ramnit Goes Socia
    • Raff, A.1
  • 136
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • Ramachandran, A., Feamster, N., 2006. Understanding the network-level behavior of spammers. ACM SIGCOMM Comput. Commun. Rev., 36(4):291–302. [doi:10.1145/1151659.1159947]
    • (2006) ACM SIGCOMM Comput. Commun. Rev , vol.36 , Issue.4 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2
  • 138
  • 141
    • 84870604278 scopus 로고    scopus 로고
    • Privacy regulations for cloud computing: compliance and implementation in theory and practice
    • Ruiter, J., Warnier, M., 2011. Privacy regulations for cloud computing: compliance and implementation in theory and practice. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, p.361–376. [doi:10.1007/978-94-007-0641-5_17]
    • (2011) Computers, Privacy and Data Protection: an Element of Choic , pp. 361-376
    • Ruiter, J.1    Warnier, M.2
  • 143
    • 85006569245 scopus 로고    scopus 로고
    • Blocking spam by separating end-user machines from legitimate mail server machines
    • Sanchez, F., Duan, Z., Dong, Y., 2012. Blocking spam by separating end-user machines from legitimate mail server machines. Secur. Commun. Networks, p.1–9.
    • (2012) Secur. Commun. Network , pp. 1-9
    • Sanchez, F.1    Duan, Z.2    Dong, Y.3
  • 149
    • 85006561897 scopus 로고    scopus 로고
    • Sevcenco, S., 2012. SdBot. Available from ://.symantec.com/security_response/writeup.jspdocid=2002-051312-3628-99 [Accessed on Dec. 14, 2013].
    • (2012) SdBo
    • Sevcenco, S.1
  • 150
    • 77951130249 scopus 로고    scopus 로고
    • Architecture for applying data mining and visualization on network flow for botnet traffic detection
    • Shahrestani, A., Feily, M., Ahmad, R., et al., 2009. Architecture for applying data mining and visualization on network flow for botnet traffic detection. IEEE Int. Conf. on Computer Technology and Development, p.33–37.
    • (2009) IEEE Int. Conf. on Computer Technology and Developmen , pp. 33-37
    • Shahrestani, A.1    Feily, M.2    Ahmad, R.3
  • 151
    • 84929898812 scopus 로고    scopus 로고
    • A survey of botnet: consequences, defenses and challenges
    • Shin, Y.H., Im, E.G., 2009. A survey of botnet: consequences, defenses and challenges. Joint Workshop on Internet Security, p.1–11.
    • (2009) Joint Workshop on Internet Securit , pp. 1-11
    • Shin, Y.H.1    Im, E.G.2
  • 152
    • 84875223281 scopus 로고    scopus 로고
    • Botnets: a survey
    • Silva, S.S., Silva, R.M., Pinto, R.C.G., et al., 2013. Botnets: a survey. Comput. Networks, 57(2):378–403. [doi:10.1016/j.comnet.2012.07.021]
    • (2013) Comput. Network , vol.57 , Issue.2 , pp. 378-403
    • Silva, S.S.1    Silva, R.M.2    Pinto, R.C.G.3
  • 155
    • 80053943682 scopus 로고    scopus 로고
    • A framework for DNS based detection and mitigation of malware infections on a network
    • Stalmans, E., Irwin, B., 2011. A framework for DNS based detection and mitigation of malware infections on a network. IEEE Information Security South Africa, p.1–8.
    • (2011) IEEE Information Security South Afric , pp. 1-8
    • Stalmans, E.1    Irwin, B.2
  • 161
    • 84865618856 scopus 로고    scopus 로고
    • Characterizing bots’ remote control behavior
    • Stinson, E., Mitchell, J.C., 2008. Characterizing bots’ remote control behavior. In: Botnet Detection. Springer, p.45–64. [doi:10.1007/978-0-387-68768-1_3]
    • (2008) Botnet Detectio , pp. 45-64
    • Stinson, E.1    Mitchell, J.C.2
  • 163
    • 84882753373 scopus 로고    scopus 로고
    • Botnet detection based on network behavior
    • Strayer, W.T., Lapsely, D., Walsh, R., et al., 2008. Botnet detection based on network behavior. In: Botnet Detection. Springer, p.1–24. [doi:10.1007/978-0-387-68768-1_1]
    • (2008) Botnet Detection. Springe , pp. 1-24
    • Strayer, W.T.1    Lapsely, D.2    Walsh, R.3
  • 165
    • 85006628261 scopus 로고    scopus 로고
    • Symantic, 2010. Bagle. Available from ://.messagelabs.com/mlireport/MLI_2010_04_Apr_FINAL_EN.pdf [Accessed on Apr. 7, 2014].
    • (2010) Bagl
    • Symantic1
  • 166
    • 85006597290 scopus 로고    scopus 로고
    • Systems, C., 2012. DNS Best Practices. Available from ://.cisco.com/web/about/security/intelligence/dns-bcp.html [Accessed on Dec. 5, 2013].
    • (2012) DNS Best Practice
    • Systems, C.1
  • 169
    • 84873838558 scopus 로고    scopus 로고
    • Efficient computer network anomaly detection by changepoint detection methods
    • Tartakovsky, A.G., Polunchenko, A.S., Sokolov, G., 2013. Efficient computer network anomaly detection by changepoint detection methods. IEEE J. Sel. Topics Signal Process., 7(1):4–11. [doi:10.1109/JSTSP.2013.2241912]
    • (2013) IEEE J. Sel. Topics Signal Process , vol.7 , Issue.1 , pp. 4-11
    • Tartakovsky, A.G.1    Polunchenko, A.S.2    Sokolov, G.3
  • 176
    • 85006569283 scopus 로고    scopus 로고
    • Trend Micro, 2013. Andrameda Botnet. Available from ://blog.trendmicro.com/trendlabs-security-intelligence/andromeda-botnet-gets-an-update/ [Accessed on Nov. 7, 2013].
    • (2013) Andrameda Botne
    • Trend Micro1
  • 178
  • 182
    • 67650145176 scopus 로고    scopus 로고
    • Swing: realistic and responsive network traffic generation
    • Vishwanath, K.V., Vahdat, A., 2009. Swing: realistic and responsive network traffic generation. IEEE/ACM Trans. Network., 17(3):712–725. [doi:10.1109/TNET.2009.2020830]
    • (2009) IEEE/ACM Trans. Network , vol.17 , Issue.3 , pp. 712-725
    • Vishwanath, K.V.1    Vahdat, A.2
  • 186
    • 77952687808 scopus 로고    scopus 로고
    • An advanced hybrid peer-to-peer botnet
    • Wang, P., Sparks, S., Zou, C., 2010. An advanced hybrid peer-to-peer botnet. IEEE Trans. Depend. Secur. Comput., 7(2):113–127. [doi:10.1109/TDSC.2008.35]
    • (2010) IEEE Trans. Depend. Secur. Comput , vol.7 , Issue.2 , pp. 113-127
    • Wang, P.1    Sparks, S.2    Zou, C.3
  • 188
    • 85006625192 scopus 로고    scopus 로고
    • Wang, X.R., 2003. Eggdrop. Available from ://.symantec.com/security_response/writeup.jspdocid=2003-041013-5338-99 [Accessed on July 8, 2013].
    • (2003) Eggdro
    • Wang, X.R.1
  • 191
    • 33746144908 scopus 로고    scopus 로고
    • Tmix: a tool for generating realistic TCP application workloads in ns-2
    • Weigle, M.C., Adurthi, P., Hernández-Campos, F., et al., 2006. Tmix: a tool for generating realistic TCP application workloads in ns-2. ACM SIGCOMM Comput. Commun. Rev., 36(3):65–76. [doi:10.1145/1140086.1140094]
    • (2006) ACM SIGCOMM Comput. Commun. Rev , vol.36 , Issue.3 , pp. 65-76
    • Weigle, M.C.1    Adurthi, P.2    Hernández-Campos, F.3
  • 193
    • 85006603738 scopus 로고    scopus 로고
    • Wikipedia, 1998. NetBus. Available from ://en.wikipedia.org/wiki/NetBus [Accessed on Aug. 7, 2013].
    • (1998) NetBu
    • Wikipedia1
  • 194
    • 85006614288 scopus 로고    scopus 로고
    • Wikipedia, 2013a. Anomaly Detection. Available from ://en.wikipedia.org/wiki/Anomaly_detection [Accessed on Aug. 7, 2013].
    • (2013) Anomaly Detectio
    • Wikipedia1
  • 195
    • 85006571862 scopus 로고    scopus 로고
    • Wikipedia, 2013b. Botnets. Available from ://en.wikipedia.org/wiki/Botnet [Accessed on Aug. 7, 2013].
    • (2013) Botnet
    • Wikipedia1
  • 196
    • 85006615514 scopus 로고    scopus 로고
    • Wikipedia, 2013c. Mariposa Botnet. Available from ://en.wikipedia.org/wiki/Mariposa_botnet [Accessed on Aug. 7, 2013].
    • (2013) Mariposa Botne
    • Wikipedia1
  • 198
    • 85006583472 scopus 로고    scopus 로고
    • WordPress, 2008. Social VPN. Available from ://socialvpn.wordpress.com/ [Accessed on Dec. 25, 2013].
    • (2008) Social VP
    • WordPress1
  • 199
    • 70350374367 scopus 로고    scopus 로고
    • Automatically generating models for botnet detection
    • Wurzinger, P., Bilge, L., Holz, T., et al., 2009. Automatically generating models for botnet detection. Computer Security ESORICS, p.232–249.
    • (2009) Computer Security ESORIC , pp. 232-249
    • Wurzinger, P.1    Bilge, L.2    Holz, T.3
  • 206
    • 78651593637 scopus 로고    scopus 로고
    • Online botnet detection based on incremental discrete Fourier transform
    • Yu, X., Dong, X., Yu, G., et al., 2010. Online botnet detection based on incremental discrete Fourier transform. J. Networks, 5(5):568–576. [doi:10.4304/jnw.5.5.568-576]
    • (2010) J. Network , vol.5 , Issue.5 , pp. 568-576
    • Yu, X.1    Dong, X.2    Yu, G.3
  • 209
    • 79960678642 scopus 로고    scopus 로고
    • Measuring the effectiveness of infrastructure-level detection of large-scale botnets
    • Zeng, Y., Yan, G., Eidenbenz, S., et al., 2011. Measuring the effectiveness of infrastructure-level detection of large-scale botnets. IEEE 19th Int. Workshop on Quality of Service, p.1–9.
    • (2011) IEEE 19th Int. Workshop on Quality of Servic , pp. 1-9
    • Zeng, Y.1    Yan, G.2    Eidenbenz, S.3
  • 212
    • 84872116111 scopus 로고    scopus 로고
    • Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service
    • Zhao, S., Lee, P.P., Lui, J., et al., 2012. Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. Proc. 28th Annual Computer Security Applications Conf., p.119–128.
    • (2012) Proc. 28th Annual Computer Security Applications Conf , pp. 119-128
    • Zhao, S.1    Lee, P.P.2    Lui, J.3
  • 213
    • 79954733367 scopus 로고    scopus 로고
    • BotGraph: large scale spamming botnet detection
    • Zhao, Y., Xie, Y., Yu, F., et al., 2009. BotGraph: large scale spamming botnet detection. NSDI, 9:321–334.
    • (2009) NSD , vol.9 , pp. 321-334
    • Zhao, Y.1    Xie, Y.2    Yu, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.