메뉴 건너뛰기




Volumn 17, Issue 4, 2015, Pages 2242-2270

Botnet in DDoS Attacks: Trends and Challenges

Author keywords

botnet; DDoS attack; DDoS prevention; IP traceback; mobile botnet

Indexed keywords

APPLICATION PROGRAMS; CRIME; DISTRIBUTED COMPUTER SYSTEMS; HIERARCHICAL SYSTEMS; INTERNET; MALWARE; NETWORK ARCHITECTURE; NETWORK SECURITY; TELECOMMUNICATION TRAFFIC;

EID: 84970046203     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2015.2457491     Document Type: Article
Times cited : (219)

References (145)
  • 1
    • 84860393847 scopus 로고    scopus 로고
    • Resource sharing optimization for device-to-device communication underlaying cellular networks
    • Aug.
    • C.-H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, "Resource sharing optimization for device-to-device communication underlaying cellular networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2752-2763, Aug. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.8 , pp. 2752-2763
    • Yu, C.-H.1    Doppler, K.2    Ribeiro, C.B.3    Tirkkonen, O.4
  • 2
    • 84901445861 scopus 로고    scopus 로고
    • MIFS-ND: A mutual information-based feature selection method
    • Oct.
    • N. Hoque, D. Bhattacharyya, and J. Kalita, "MIFS-ND: A mutual information-based feature selection method," Expert Syst. Appl., vol. 41, no. 14, pp. 6371-6385, Oct. 2014.
    • (2014) Expert Syst. Appl. , vol.41 , Issue.14 , pp. 6371-6385
    • Hoque, N.1    Bhattacharyya, D.2    Kalita, J.3
  • 8
    • 84885213527 scopus 로고    scopus 로고
    • Survey and taxonomy of botnet research through life-cycle
    • Aug.
    • R. A. Rodríguez-Gómez, G. Mació-Fernóndez, and P. García-Teodoro, "Survey and taxonomy of botnet research through life-cycle," ACM CSUR, vol. 45, no. 4, p. 45, Aug. 2013.
    • (2013) ACM CSUR , vol.45 , Issue.4 , pp. 45
    • Rodríguez-Gómez, R.A.1    Mació-Fernóndez, G.2    García-Teodoro, P.3
  • 10
    • 68949173234 scopus 로고    scopus 로고
    • Taxonomies of attacks and vulnerabilities in computer systems
    • 1st Quart
    • V. Igure and R. Williams, "Taxonomies of attacks and vulnerabilities in computer systems," IEEE Commun. Surveys Tuts., vol. 10, no. 1, pp. 6-19, 1st Quart. 2008.
    • (2008) IEEE Commun. Surveys Tuts. , vol.10 , Issue.1 , pp. 6-19
    • Igure, V.1    Williams, R.2
  • 11
    • 30344436961 scopus 로고    scopus 로고
    • Monitoring the macroscopic effect of DDoS flooding attacks
    • Oct.-Dec.
    • J. Yuan and K. Mills, "Monitoring the macroscopic effect of DDoS flooding attacks," IEEE Trans. Depend. Secure Comput., vol. 2, no. 4, pp. 324-335, Oct.-Dec. 2005.
    • (2005) IEEE Trans. Depend. Secure Comput. , vol.2 , Issue.4 , pp. 324-335
    • Yuan, J.1    Mills, K.2
  • 13
    • 84872569785 scopus 로고    scopus 로고
    • Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art
    • Jul.
    • E. Alomari, S. Manickam, B. Gupta, S. Karuppayah, and R. Alfaris, "Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art," Int. J. Comput. Appl., vol. 49, no. 7, pp. 24-32, Jul. 2012.
    • (2012) Int. J. Comput. Appl. , vol.49 , Issue.7 , pp. 24-32
    • Alomari, E.1    Manickam, S.2    Gupta, B.3    Karuppayah, S.4    Alfaris, R.5
  • 14
    • 84879127257 scopus 로고    scopus 로고
    • LOIC will tear us apart the impact of tool design and media portrayals in the success of activist DDoS attacks
    • M. Sauter, "LOIC will tear us apart the impact of tool design and media portrayals in the success of activist DDoS attacks," Amer. Behavioral Sci., vol. 57, no. 7, pp. 983-1007, 2013.
    • (2013) Amer. Behavioral Sci. , vol.57 , Issue.7 , pp. 983-1007
    • Sauter, M.1
  • 15
    • 84996426886 scopus 로고    scopus 로고
    • Botnet communication topologies
    • G. Ollmann, "Botnet communication topologies," Retrieved Sep., vol. 30, pp. 1-7, 2009.
    • (2009) Retrieved Sep. , vol.30 , pp. 1-7
    • Ollmann, G.1
  • 16
    • 84884857545 scopus 로고    scopus 로고
    • ZHT: A light-weight reliable persistent dynamic scalable zero-hop distributed hash table
    • T. Li et al., "ZHT: A light-weight reliable persistent dynamic scalable zero-hop distributed hash table," in Proc IEEE IPDPS, 2013, pp. 775-787.
    • (2013) Proc IEEE IPDPS , pp. 775-787
    • Li, T.1
  • 19
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
    • Berlin, Germany: Springer-Verlag
    • A. Rowstron and P. Druschel, "Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems," in Middleware 2001. Berlin, Germany: Springer-Verlag, 2001, pp. 329-350.
    • (2001) Middleware 2001 , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 20
    • 0742267177 scopus 로고    scopus 로고
    • Tapestry: A resilient global-scale overlay for service deployment
    • Jan.
    • B. Y. Zhao et al., "Tapestry: A resilient global-scale overlay for service deployment," IEEE J. Sel. Areas Commun., vol. 22, no. 1, pp. 41-53, Jan. 2004.
    • (2004) IEEE J. Sel. Areas Commun. , vol.22 , Issue.1 , pp. 41-53
    • Zhao, B.Y.1
  • 21
    • 84947235017 scopus 로고    scopus 로고
    • Kademlia: A peer-to-peer information system based on the XOR metric
    • Berlin, Germany: Springer-Verlag
    • P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the XOR metric," in Peer-to-Peer Systems. Berlin, Germany: Springer-Verlag, 2002, pp. 53-65.
    • (2002) Peer-to-Peer Systems , pp. 53-65
    • Maymounkov, P.1    Mazieres, D.2
  • 23
    • 84875227155 scopus 로고    scopus 로고
    • [Online]
    • T. Micro, "Worm agobot," 2004. [Online]. Available: http://aboutthreats. trendmicro.com/ArchiveMalware.aspx?language=us&name= WORMAGOBOT
    • (2004) Worm Agobot
    • Micro, T.1
  • 24
    • 84969960390 scopus 로고    scopus 로고
    • [Online]
    • T. Microhgj, "Worm sdbot," 2003. [Online]. Available: http://aboutthreats. trendmicro.com/ArchiveMalware.aspx?language=us&name= WORMSDBOT
    • (2003) Worm Sdbot
    • Microhgj, T.1
  • 25
    • 84969986162 scopus 로고    scopus 로고
    • rbot, [Online]
    • rbot, "The Ruby IRC bot." [Online]. Available: http://ruby-rbot.org/
    • The Ruby IRC Bot.
  • 30
    • 79551627401 scopus 로고    scopus 로고
    • Analysis of a botnet takeover
    • Jan./Feb.
    • B. Stone-Gross et al., "Analysis of a botnet takeover," IEEE Security Privacy, vol. 9, no. 1, pp. 64-72, Jan./Feb. 2011.
    • (2011) IEEE Security Privacy , vol.9 , Issue.1 , pp. 64-72
    • Stone-Gross, B.1
  • 31
    • 49049107082 scopus 로고    scopus 로고
    • Analysis of the storm and nugache trojans: P2P is here
    • S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich, "Analysis of the storm and nugache trojans: P2P is here," USENIX; login, vol. 32, no. 6, pp. 18-27, 2007.
    • (2007) USENIX; Login , vol.32 , Issue.6 , pp. 18-27
    • Stover, S.1    Dittrich, D.2    Hernandez, J.3    Dietrich, S.4
  • 33
    • 84969946540 scopus 로고    scopus 로고
    • [Online]
    • McAfee, "Cutall" 2015. [Online]. Available: http://vil.nai.com/vil/content/v-144515.htm
    • (2015) Cutall
  • 39
    • 84888328281 scopus 로고    scopus 로고
    • Phishing detection: A literature survey
    • 4th Quart
    • M. Khonji, Y. Iraqi, and A. Jones, "Phishing detection: A literature survey," IEEE Commun. Surveys Tuts., vol. 15, no. 4, pp. 2091-2121, 4th Quart. 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.4 , pp. 2091-2121
    • Khonji, M.1    Iraqi, Y.2    Jones, A.3
  • 40
    • 84969921992 scopus 로고    scopus 로고
    • New massive botnet twice the size of storm
    • San Francisco, CA, USA: Dark Reading
    • K. Higgins, "New massive botnet twice the size of storm," in Retrieved May. San Francisco, CA, USA: Dark Reading, vol. 13, 2008.
    • (2008) Retrieved May , vol.13
    • Higgins, K.1
  • 42
    • 80054026693 scopus 로고    scopus 로고
    • Secure Works, Atlanta, GA, USA, [Online]
    • J. Stewart, "Spam botnets to watch in 2009," Secure Works, Atlanta, GA, USA, 2009. [Online]. Available: http://www.secureworks.com/research/threats/botnets2009
    • (2009) Spam Botnets to Watch in 2009
    • Stewart, J.1
  • 44
    • 85015508077 scopus 로고    scopus 로고
    • The war against botnets
    • Feb.
    • S. Greengard, "The war against botnets," Commun. ACM, vol. 55, no. 2, pp. 16-18, Feb. 2012.
    • (2012) Commun. ACM , vol.55 , Issue.2 , pp. 16-18
    • Greengard, S.1
  • 46
    • 84880818606 scopus 로고    scopus 로고
    • S-URL flux: A novel c&c protocol for mobile botnets
    • Berlin, Germany: Springer-Verlag
    • W. Shuai, C. Xiang, L. Peng, and L. Dan, "S-URL flux: A novel c&c protocol for mobile botnets," in Trustworthy Computing and Services. Berlin, Germany: Springer-Verlag, 2013, pp. 412-419.
    • (2013) Trustworthy Computing and Services , pp. 412-419
    • Shuai, W.1    Xiang, C.2    Peng, L.3    Dan, L.4
  • 47
    • 84873712223 scopus 로고    scopus 로고
    • A survey on security for mobile devices
    • 1st Quart
    • M. La Polla, F. Martinelli, and D. Sgandurra, "A survey on security for mobile devices," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 446-471, 1st Quart. 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.1 , pp. 446-471
    • La Polla, M.1    Martinelli, F.2    Sgandurra, D.3
  • 50
    • 84875695278 scopus 로고    scopus 로고
    • Mobots: A new generation of botnets on mobile devices and networks
    • M. Eslahi, R. Salleh, and N. B. Anuar, "Mobots: A new generation of botnets on mobile devices and networks," in Proc. IEEE ISCAIE, 2012, pp. 262-266.
    • (2012) Proc. IEEE ISCAIE , pp. 262-266
    • Eslahi, M.1    Salleh, R.2    Anuar, N.B.3
  • 51
    • 84869222883 scopus 로고    scopus 로고
    • Android botnets on the rise: Trends and characteristics
    • H. Pieterse and M. S. Olivier, "Android botnets on the rise: Trends and characteristics," in Proc. IEEE ISSA, 2012, pp. 1-5.
    • (2012) Proc. IEEE ISSA , pp. 1-5
    • Pieterse, H.1    Olivier, M.S.2
  • 56
    • 84888391622 scopus 로고    scopus 로고
    • A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
    • 4th Quart
    • S. T. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," IEEE Commun. Surveys Tuts., vol. 15, no. 4, pp. 2046-2069, 4th Quart. 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.4 , pp. 2046-2069
    • Zargar, S.T.1    Joshi, J.2    Tipper, D.3
  • 58
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • Jul.-Sep.
    • J. Mirkovic and P. Reiher, "D-WARD: A source-end defense against flooding denial-of-service attacks," IEEE Trans. Depend. Secure Comput., vol. 2, no. 3, pp. 216-232, Jul.-Sep. 2005.
    • (2005) IEEE Trans. Depend. Secure Comput. , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 59
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets," in Proc. ACM SIGCOMM Comput. Commun. Rev., 2001, vol. 31, no. 4, pp. 15-26.
    • (2001) Proc. ACM SIGCOMM Comput. Commun. Rev. , vol.31 , Issue.4 , pp. 15-26
    • Park, K.1    Lee, H.2
  • 60
    • 41949118967 scopus 로고    scopus 로고
    • Detecting compromised routers via packet forwarding behavior
    • Mar./Apr.
    • A. T. Mizrak, S. Savage, and K. Marzullo, "Detecting compromised routers via packet forwarding behavior," IEEE Netw., vol. 22, no. 2, pp. 34-39, Mar./Apr. 2008.
    • (2008) IEEE Netw. , vol.22 , Issue.2 , pp. 34-39
    • Mizrak, A.T.1    Savage, S.2    Marzullo, K.3
  • 61
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • Feb./Mar.
    • P. Garcia-Teodoro, J. Diaz-Verdejo, G. Mació-Fernóndez, and E. Vózquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges," Comput. Security, vol. 28, no. 1, pp. 18-28, Feb./Mar. 2009.
    • (2009) Comput. Security , vol.28 , Issue.1 , pp. 18-28
    • Garcia-Teodoro, P.1    Diaz-Verdejo, J.2    Mació-Fernóndez, G.3    Vózquez, E.4
  • 62
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in IP networks
    • Aug.
    • M. Thottan and C. Ji, "Anomaly detection in IP networks," IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 63
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Nov.
    • W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM TiSSEC, vol. 3, no. 4, pp. 227-261, Nov. 2000.
    • (2000) ACM TiSSEC , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 64
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • Nov.
    • O. Depren, M. Topallar, E. Anarim, and M. K. Ciliz, "An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks," Expert Syst. Appl., vol. 29, no. 4, pp. 713-722, Nov. 2005.
    • (2005) Expert Syst. Appl. , vol.29 , Issue.4 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 65
    • 77953145744 scopus 로고    scopus 로고
    • A survey of internet worm detection and containment
    • 1st Quart
    • P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment," IEEE Commun. Surveys Tuts., vol. 10, no. 1, pp. 20-35, 1st Quart. 2008.
    • (2008) IEEE Commun. Surveys Tuts. , vol.10 , Issue.1 , pp. 20-35
    • Li, P.1    Salour, M.2    Su, X.3
  • 66
    • 77955469676 scopus 로고    scopus 로고
    • An overview of IP flow-based intrusion detection
    • 3rd Quart
    • A. Sperotto et al., "An overview of IP flow-based intrusion detection," IEEE Commun. Surveys Tuts., vol. 12, no. 3, pp. 343-356, 3rd Quart. 2010.
    • (2010) IEEE Commun. Surveys Tuts. , vol.12 , Issue.3 , pp. 343-356
    • Sperotto, A.1
  • 67
    • 84894646147 scopus 로고    scopus 로고
    • Network anomaly detection: Methods, systems and tools
    • 1st Quart
    • M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Network anomaly detection: Methods, systems and tools," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 303-336, 1st Quart. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.1 , pp. 303-336
    • Bhuyan, M.H.1    Bhattacharyya, D.K.2    Kalita, J.K.3
  • 68
    • 80051801375 scopus 로고    scopus 로고
    • Denial of service attacks in wireless networks: The case of jammers
    • 2nd Quart
    • K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," IEEE Commun. Surveys Tuts., vol. 13, no. 2, pp. 245-257, 2nd Quart. 2011.
    • (2011) IEEE Commun. Surveys Tuts. , vol.13 , Issue.2 , pp. 245-257
    • Pelechrinis, K.1    Iliofotou, M.2    Krishnamurthy, S.V.3
  • 69
    • 84897441938 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks: Methods, tools and future directions
    • M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, and J. K. Kalita, "Detecting distributed denial of service attacks: Methods, tools and future directions," The Comput. J., vol. 57, no. 4, pp. 537-556, 2013.
    • (2013) The Comput. J. , vol.57 , Issue.4 , pp. 537-556
    • Bhuyan, M.H.1    Kashyap, H.J.2    Bhattacharyya, D.K.3    Kalita, J.K.4
  • 70
    • 84857998109 scopus 로고    scopus 로고
    • A survey on the application of FPGAS for network infrastructure security
    • 4th Quart
    • H. Chen, Y. Chen, and D. H. Summerville, "A survey on the application of FPGAS for network infrastructure security," IEEE Commun. Surveys Tuts., vol. 13, no. 4, pp. 541-561, 4th Quart. 2011.
    • (2011) IEEE Commun. Surveys Tuts. , vol.13 , Issue.4 , pp. 541-561
    • Chen, H.1    Chen, Y.2    Summerville, D.H.3
  • 71
    • 38149018453 scopus 로고    scopus 로고
    • DDoS attack detection algorithms based on entropy computing
    • Berlin, Germany: Springer-Verlag
    • L. Li, J. Zhou, and N. Xiao, "DDoS attack detection algorithms based on entropy computing," in Information and Communications Security. Berlin, Germany: Springer-Verlag, 2007, pp. 452-466.
    • (2007) Information and Communications Security , pp. 452-466
    • Li, L.1    Zhou, J.2    Xiao, N.3
  • 73
    • 84885603471 scopus 로고    scopus 로고
    • Dynamic entropy based DoS attack detection method
    • Oct.
    • Z. Jian-Qi, F. Feng, Y. Ke-xin, and L. Yan-Heng, "Dynamic entropy based DoS attack detection method," Comput. Electr. Eng., vol. 39, no. 7, pp. 2243-2251, Oct. 2013.
    • (2013) Comput. Electr. Eng. , vol.39 , Issue.7 , pp. 2243-2251
    • Jian-Qi, Z.1    Feng, F.2    Ke-Xin, Y.3    Yan-Heng, L.4
  • 74
    • 58149490850 scopus 로고    scopus 로고
    • Information theory based detection against network behavior mimicking ddos attacks
    • Apr.
    • S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking ddos attacks," IEEE Commun. Lett., vol. 12, no. 4, pp. 318-321, Apr. 2008.
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.4 , pp. 318-321
    • Yu, S.1    Zhou, W.2    Doss, R.3
  • 75
    • 4143081502 scopus 로고    scopus 로고
    • A covariance analysis model for DDoS attack detection
    • S. Jin and D. S. Yeung, "A covariance analysis model for DDoS attack detection," in Proc. IEEE Int. Conf. Commun., 2004, vol. 4, pp. 1882-1886.
    • (2004) Proc. IEEE Int. Conf. Commun. , vol.4 , pp. 1882-1886
    • Jin, S.1    Yeung, D.S.2
  • 76
    • 84860543902 scopus 로고    scopus 로고
    • Discriminating DDoS attacks from flash crowds using flow correlation coefficient
    • Jun.
    • S. Yu et al., "Discriminating DDoS attacks from flash crowds using flow correlation coefficient," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1073-1080, Jun. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.6 , pp. 1073-1080
    • Yu, S.1
  • 77
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • Feb.
    • X. Yi and Y. Shunzheng, "Monitoring the application-layer DDoS attacks for popular websites," IEEE Trans. Netw., vol. 17, no. 1, pp. 15-25, Feb. 2009.
    • (2009) IEEE Trans. Netw. , vol.17 , Issue.1 , pp. 15-25
    • Yi, X.1    Shunzheng, Y.2
  • 78
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
    • Feb.
    • Y. Xie and S.-Z. Yu, "A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors," IEEE Trans. Netw., vol. 17, no. 1, pp. 54-65, Feb. 2009.
    • (2009) IEEE Trans. Netw. , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.-Z.2
  • 82
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of DDoS attacks over multiple network domains
    • Dec.
    • Y. Chen, K. Hwang, and W.-S. Ku, "Collaborative detection of DDoS attacks over multiple network domains," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 12, pp. 1649-1662, Dec. 2007.
    • (2007) IEEE Trans. Parallel Distrib. Syst. , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 83
    • 35648969617 scopus 로고    scopus 로고
    • A denial of service detector based on maximum likelihood detection and the random neural network
    • G. Öke and G. Loukas, "A denial of service detector based on maximum likelihood detection and the random neural network," The Comput. J., vol. 50, no. 6, pp. 717-727, 2007.
    • (2007) The Comput. J. , vol.50 , Issue.6 , pp. 717-727
    • Öke, G.1    Loukas, G.2
  • 84
    • 65349192442 scopus 로고    scopus 로고
    • A new detection method for distributed denial-of-service attack traffic based on statistical test
    • C.-L. Chen, "A new detection method for distributed denial-of-service attack traffic based on statistical test," J. UCS, vol. 15, no. 2, pp. 488-504, 2009.
    • (2009) J. UCS , vol.15 , Issue.2 , pp. 488-504
    • Chen, C.-L.1
  • 85
    • 79551523280 scopus 로고    scopus 로고
    • Traceback of DDoS attacks using entropy variations
    • Mar.
    • S. Yu, W. Zhou, R. Doss, and W. Jia, "Traceback of DDoS attacks using entropy variations," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 3, pp. 412-425, Mar. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.3 , pp. 412-425
    • Yu, S.1    Zhou, W.2    Doss, R.3    Jia, W.4
  • 86
    • 84893060840 scopus 로고    scopus 로고
    • TDPF: A traceback-based distributed packet filter to mitigate spoofed DDoS attacks
    • M. S. Fallah and N. Kahani, "TDPF: A traceback-based distributed packet filter to mitigate spoofed DDoS attacks," Security Commun. Netw., vol. 7, no. 2, pp. 245-264, 2013.
    • (2013) Security Commun. Netw. , vol.7 , Issue.2 , pp. 245-264
    • Fallah, M.S.1    Kahani, N.2
  • 88
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • 4th Quart
    • T. T. Nguyen and G. Armitage, "A survey of techniques for internet traffic classification using machine learning," IEEE Commun. Surveys Tuts., vol. 10, no. 4, pp. 56-76, 4th Quart. 2008.
    • (2008) IEEE Commun. Surveys Tuts. , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.T.1    Armitage, G.2
  • 89
    • 34250801472 scopus 로고    scopus 로고
    • A hybrid machine learning approach to network anomaly detection
    • Sep.
    • T. Shon and J. Moon, "A hybrid machine learning approach to network anomaly detection," Inf. Sci., vol. 177, no. 18, pp. 3799-3821, Sep. 2007.
    • (2007) Inf. Sci. , vol.177 , Issue.18 , pp. 3799-3821
    • Shon, T.1    Moon, J.2
  • 90
    • 79952567907 scopus 로고    scopus 로고
    • A system approach to network modeling for DDoS detection using a naìve Bayesian classifier
    • R. Vijayasarathy, S. V. Raghavan, and B. Ravindran, "A system approach to network modeling for DDoS detection using a naìve bayesian classifier," in Proc. IEEE 3rd Int. Conf. COMSNETS, 2011, pp. 1-10.
    • (2011) Proc. IEEE 3rd Int. Conf. COMSNETS , pp. 1-10
    • Vijayasarathy, R.1    Raghavan, S.V.2    Ravindran, B.3
  • 91
    • 33847704184 scopus 로고    scopus 로고
    • K-means+ID3: A novel method for supervised anomaly detection by cascading K-means clustering and ID3 decision tree learning methods
    • Mar.
    • S. R. Gaddam, V. V. Phoha, and K. S. Balagani, "K-means+ID3: A novel method for supervised anomaly detection by cascading K-means clustering and ID3 decision tree learning methods," IEEE Trans. Knowl. Data Eng., vol. 19, no. 3, pp. 345-354, Mar. 2007.
    • (2007) IEEE Trans. Knowl. Data Eng. , vol.19 , Issue.3 , pp. 345-354
    • Gaddam, S.R.1    Phoha, V.V.2    Balagani, K.S.3
  • 92
    • 78650707301 scopus 로고    scopus 로고
    • Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers
    • Apr.
    • M.-Y. Su, "Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers," Expert Syst. Appl., vol. 38, no. 4, pp. 3492-3498, Apr. 2011.
    • (2011) Expert Syst. Appl. , vol.38 , Issue.4 , pp. 3492-3498
    • Su, M.-Y.1
  • 93
    • 80052226808 scopus 로고    scopus 로고
    • Real time detection and classification of DDoS attacks using enhanced SVM with string kernels
    • A. Ramamoorthi, T. Subbulakshmi, and S. M. Shalinie, "Real time detection and classification of DDoS attacks using enhanced SVM with string kernels," in Proc. IEEE ICRTIT, 2011, pp. 91-96.
    • (2011) Proc. IEEE ICRTIT , pp. 91-96
    • Ramamoorthi, A.1    Subbulakshmi, T.2    Shalinie, S.M.3
  • 94
    • 84865258778 scopus 로고    scopus 로고
    • Real time DDoS detection using fuzzy estimators
    • Sep.
    • S. N. Shiaeles, V. Katos, A. S. Karakos, and B. K. Papadopoulos, "Real time DDoS detection using fuzzy estimators," Comput. Security, vol. 31, no. 6, pp. 782-790, Sep. 2012.
    • (2012) Comput. Security , vol.31 , Issue.6 , pp. 782-790
    • Shiaeles, S.N.1    Katos, V.2    Karakos, A.S.3    Papadopoulos, B.K.4
  • 95
    • 34548118248 scopus 로고    scopus 로고
    • Offline/realtime traffic classification using semi-supervised learning
    • Oct.
    • J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realtime traffic classification using semi-supervised learning," Perform. Eval., vol. 64, no. 9, pp. 1194-1213, Oct. 2007.
    • (2007) Perform. Eval. , vol.64 , Issue.9 , pp. 1194-1213
    • Erman, J.1    Mahanti, A.2    Arlitt, M.3    Cohen, I.4    Williamson, C.5
  • 97
    • 16644393989 scopus 로고    scopus 로고
    • Real-time detection of distributed denialof-service attacks using RBF networks and statistical features
    • Jun.
    • D. Gavrilis and E. Dermatas, "Real-time detection of distributed denialof-service attacks using RBF networks and statistical features," Comput. Netw., vol. 48, no. 2, pp. 235-245, Jun. 2005.
    • (2005) Comput. Netw. , vol.48 , Issue.2 , pp. 235-245
    • Gavrilis, D.1    Dermatas, E.2
  • 98
    • 33745442482 scopus 로고    scopus 로고
    • A machine learning framework for network anomaly detection using SVM and GA
    • T. Shon, Y. Kim, C. Lee, and J. Moon, "A machine learning framework for network anomaly detection using SVM and GA," in Proc. IEEE 6th Annu. SMC IAW, 2005, pp. 176-183.
    • (2005) Proc. IEEE 6th Annu. SMC IAW , pp. 176-183
    • Shon, T.1    Kim, Y.2    Lee, C.3    Moon, J.4
  • 100
    • 50949098638 scopus 로고    scopus 로고
    • QRP05-4: Internet traffic identification using machine learning
    • J. Erman, A. Mahanti, and M. Arlitt, "QRP05-4: Internet traffic identification using machine learning," in Proc. IEEE GLOBECOM, 2006, pp. 1-6.
    • (2006) Proc. IEEE GLOBECOM , pp. 1-6
    • Erman, J.1    Mahanti, A.2    Arlitt, M.3
  • 101
    • 79958207846 scopus 로고    scopus 로고
    • Nobot: Embedded malware detection for endpoint devices
    • Jun.
    • L. E. Menten, A. Chen, and D. Stiliadis, "Nobot: Embedded malware detection for endpoint devices," Bell Labs Tech. J., vol. 16, no. 1, pp. 155-170, Jun. 2011.
    • (2011) Bell Labs Tech. J. , vol.16 , Issue.1 , pp. 155-170
    • Menten, L.E.1    Chen, A.2    Stiliadis, D.3
  • 102
    • 85093871360 scopus 로고    scopus 로고
    • Rishi: Identify bot contaminated hosts by IRC nickname evaluation
    • Botnets, Cambridge, MA, USA
    • J. Goebel and T. Holz, "Rishi: Identify bot contaminated hosts by IRC nickname evaluation," in Proc 1st Conf. 1st Workshop Hot Topics Understand. Botnets, Cambridge, MA, USA, 2007, pp. 8-8.
    • (2007) Proc 1st Conf. 1st Workshop Hot Topics Understand , pp. 8
    • Goebel, J.1    Holz, T.2
  • 103
    • 84882753373 scopus 로고    scopus 로고
    • Botnet detection based on network behavior
    • Berlin, Germany: Springer-Verlag
    • W. T. Strayer, D. Lapsely, R. Walsh, and C. Livadas, "Botnet detection based on network behavior," in Botnet Detection. Berlin, Germany: Springer-Verlag, 2008, pp. 1-24.
    • (2008) Botnet Detection , pp. 1-24
    • Strayer, W.T.1    Lapsely, D.2    Walsh, R.3    Livadas, C.4
  • 104
    • 84861634583 scopus 로고    scopus 로고
    • Can we beat legitimate cyber behavior mimicking attacks from botnets?
    • S. Yu, S. Guo, and I. Stojmenovic, "Can we beat legitimate cyber behavior mimicking attacks from botnets?" in Proc. IEEE INFOCOM, 2012, pp. 2851-2855.
    • (2012) Proc. IEEE INFOCOM , pp. 2851-2855
    • Yu, S.1    Guo, S.2    Stojmenovic, I.3
  • 107
    • 84898658527 scopus 로고    scopus 로고
    • [Online]
    • J. Ritter, "ngrep-network grep." [Online]. Available: http://packetfactory. openwall.net/projects/ngrep/index.html
    • Ngrep-network Grep.
    • Ritter, J.1
  • 109
    • 84888402098 scopus 로고    scopus 로고
    • The zombie roundup: Understanding, detecting, and disrupting botnets
    • E. Cooke, F. Jahanian, and D. McPherson, "The zombie roundup: Understanding, detecting, and disrupting botnets," in Proc. USENIX SRUTI Workshop, 2005, vol. 39, pp. 44-59.
    • (2005) Proc. USENIX SRUTI Workshop , vol.39 , pp. 44-59
    • Cooke, E.1    Jahanian, F.2    McPherson, D.3
  • 110
    • 38049035805 scopus 로고    scopus 로고
    • Botnet detection by monitoring group activities in DNS traffic
    • H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet detection by monitoring group activities in DNS traffic," in Proc. IEEE 7th Int. Conf. CIT, 2007, pp. 715-720.
    • (2007) Proc. IEEE 7th Int. Conf. CIT , pp. 715-720
    • Choi, H.1    Lee, H.2    Lee, H.3    Kim, H.4
  • 112
  • 113
    • 78651429288 scopus 로고    scopus 로고
    • A P2P-botnet detection model and algorithms based on network streams analysis
    • D. Liu, Y. Li, Y. Hu, and Z. Liang, "A P2P-botnet detection model and algorithms based on network streams analysis," in Proc. IEEE Int. Conf. FITME, 2010, vol. 1, pp. 55-58.
    • (2010) Proc. IEEE Int. Conf. FITME , vol.1 , pp. 55-58
    • Liu, D.1    Li, Y.2    Hu, Y.3    Liang, Z.4
  • 114
    • 85084094913 scopus 로고    scopus 로고
    • Towards automated detection of peer-to-peer botnets: On the limits of local approaches
    • M. Jelasity and V. Bilicki, "Towards automated detection of peer-to-peer botnets: On the limits of local approaches," in Proc. USENIX Workshop LEET, 2009, p. 3.
    • (2009) Proc. USENIX Workshop LEET , pp. 3
    • Jelasity, M.1    Bilicki, V.2
  • 116
    • 67249151513 scopus 로고    scopus 로고
    • Botnets detection based on IRCcommunity
    • W. Lu and A. A. Ghorbani, "Botnets detection based on IRCcommunity," in Proc. IEEE GLOBECOM, 2008, pp. 1-5.
    • (2008) Proc. IEEE GLOBECOM , pp. 1-5
    • Lu, W.1    Ghorbani, A.A.2
  • 117
    • 77955382717 scopus 로고    scopus 로고
    • A novel IRC botnet detection method based on packet size sequence
    • X. Ma et al., "A novel IRC botnet detection method based on packet size sequence," in Proc. IEEE ICC, 2010, pp. 1-5.
    • (2010) Proc. IEEE ICC , pp. 1-5
    • Ma, X.1
  • 118
    • 55349090681 scopus 로고    scopus 로고
    • IRC traffic analysis for botnet detection
    • C. Mazzariello, "IRC traffic analysis for botnet detection," in Proc. IEEE 4th Int. Conf. ISIAS, 2008, pp. 318-323.
    • (2008) Proc. IEEE 4th Int. Conf. ISIAS , pp. 318-323
    • Mazzariello, C.1
  • 119
    • 60349104800 scopus 로고    scopus 로고
    • The activity analysis of malicious HTTP-based botnets using degree of periodic repeatability
    • J.-S. Lee, H. Jeong, J.-H. Park, M. Kim, and B.-N. Noh, "The activity analysis of malicious HTTP-based botnets using degree of periodic repeatability," in Proc. IEEE Int. Conf. SECTECH, 2008, pp. 83-86.
    • (2008) Proc. IEEE Int. Conf. SECTECH , pp. 83-86
    • Lee, J.-S.1    Jeong, H.2    Park, J.-H.3    Kim, M.4    Noh, B.-N.5
  • 125
    • 65249176218 scopus 로고    scopus 로고
    • An as-level overlay network for IP traceback
    • Jan./Feb.
    • A. Castelucio, A. Ziviani, and R. M. Salles, "An as-level overlay network for IP traceback," IEEE Netw., vol. 23, no. 1, pp. 36-41, Jan./Feb. 2009.
    • (2009) IEEE Netw. , vol.23 , Issue.1 , pp. 36-41
    • Castelucio, A.1    Ziviani, A.2    Salles, R.M.3
  • 126
    • 0036947597 scopus 로고    scopus 로고
    • Single-packet IP traceback
    • Dec.
    • A. C. Snoeren et al., "Single-packet IP traceback," IEEE ToN, vol. 10, no. 6, pp. 721-734, Dec. 2002.
    • (2002) IEEE ToN , vol.10 , Issue.6 , pp. 721-734
    • Snoeren, A.C.1
  • 127
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • H. Burch and B. Cheswick, "Tracing anonymous packets to their approximate source," in LISA, 2000, pp. 319-327.
    • (2000) LISA , pp. 319-327
    • Burch, H.1    Cheswick, B.2
  • 130
    • 67649889403 scopus 로고    scopus 로고
    • Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
    • Apr.
    • Y. Xiang, W. Zhou, and M. Guo, "Flexible deterministic packet marking: An IP traceback system to find the real source of attacks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567-580, Apr. 2009.
    • (2009) IEEE Trans. Parallel Distrib. Syst. , vol.20 , Issue.4 , pp. 567-580
    • Xiang, Y.1    Zhou, W.2    Guo, M.3
  • 131
    • 84949109093 scopus 로고    scopus 로고
    • Topology based packet marking for IP traceback
    • Citeseer
    • H. A. Alwis, R. C. Doss, P. S. Hewage, and M. U. Chowdhury, "Topology based packet marking for IP traceback," in Proc. ATNAC, Citeseer, 2006, pp. 224-228.
    • (2006) Proc. ATNAC , pp. 224-228
    • Alwis, H.A.1    Doss, R.C.2    Hewage, P.S.3    Chowdhury, M.U.4
  • 132
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Jul.
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, Jul. 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 133
    • 81255172277 scopus 로고    scopus 로고
    • A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques
    • A. Mishra, B. Gupta, and R. C. Joshi, "A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques," in Proc. IEEE EISIC, 2011, pp. 286-289.
    • (2011) Proc. IEEE EISIC , pp. 286-289
    • Mishra, A.1    Gupta, B.2    Joshi, R.C.3
  • 134
    • 33750926287 scopus 로고    scopus 로고
    • A fault tolerance mechanism for network intrusion detection system based on intelligent agents (NIDIA)
    • L. Siqueira and Z. Abdelouahab, "A fault tolerance mechanism for network intrusion detection system based on intelligent agents (NIDIA)," in Proc. IEEE 4th Workshop SEUS 2nd Int. WCCIA, 2006, pp. 1-6.
    • (2006) Proc. IEEE 4th Workshop SEUS 2nd Int. WCCIA , pp. 1-6
    • Siqueira, L.1    Abdelouahab, Z.2
  • 135
    • 0742317706 scopus 로고    scopus 로고
    • SITAR: A scalable intrusion-tolerant architecture for distributed services
    • F. Wang et al., "SITAR: A scalable intrusion-tolerant architecture for distributed services," in Proc. Workshop Inf. Assur. Security, 2003, vol. 1, p. 1100.
    • (2003) Proc. Workshop Inf. Assur. Security , vol.1 , pp. 1100
    • Wang, F.1
  • 136
    • 34548176572 scopus 로고    scopus 로고
    • Secure, resilient computing clusters: Self-cleansing intrusion tolerance with hardware enforced security (SCIT/HES)
    • D. Arsenault, A. Sood, and Y. Huang, "Secure, resilient computing clusters: Self-cleansing intrusion tolerance with hardware enforced security (SCIT/HES)," in Proc. IEEE 2nd Int. Conf. ARES, 2007, pp. 343-350.
    • (2007) Proc. IEEE 2nd Int. Conf. ARES , pp. 343-350
    • Arsenault, D.1    Sood, A.2    Huang, Y.3
  • 137
    • 84881247246 scopus 로고    scopus 로고
    • Intrusion-tolerant architectures: Concepts and design
    • Berlin, Germany: Springer-Verlag
    • P. E. Veríssimo, N. F. Neves, and M. P. Correia, "Intrusion-tolerant architectures: Concepts and design," in Architecting Dependable Systems. Berlin, Germany: Springer-Verlag, 2003, pp. 3-36.
    • (2003) Architecting Dependable Systems , pp. 3-36
    • Veríssimo, P.E.1    Neves, N.F.2    Correia, M.P.3
  • 138
    • 34748899427 scopus 로고    scopus 로고
    • Fireflies: Scalable support for intrusion-tolerant network overlays
    • Oct.
    • H. Johansen, A. Allavena, and R. Van Renesse, "Fireflies: Scalable support for intrusion-tolerant network overlays," ACM SIGOPS Oper. Syst. Rev., vol. 40, no. 4, pp. 3-13, Oct. 2006.
    • (2006) ACM SIGOPS Oper. Syst. Rev. , vol.40 , Issue.4 , pp. 3-13
    • Johansen, H.1    Allavena, A.2    Van Renesse, R.3
  • 140
    • 84858737786 scopus 로고    scopus 로고
    • Securing cloud computing environment against DDoS attacks
    • B. Joshi, A. S. Vijayan, and B. K. Joshi, "Securing cloud computing environment against DDoS attacks," in Proc. IEEE ICCCI, 2012, pp. 1-5.
    • (2012) Proc. IEEE ICCCI , pp. 1-5
    • Joshi, B.1    Vijayan, A.S.2    Joshi, B.K.3
  • 141
    • 84901245716 scopus 로고    scopus 로고
    • A taxonomy of botnet behavior, detection, and defense
    • 2nd Quart
    • S. Khattak, N. Ramay, K. Khan, A. Syed, and S. Khayam, "A taxonomy of botnet behavior, detection, and defense," IEEE Commun. Surveys Tuts., vol. 16, no. 2, pp. 898-924, 2nd Quart. 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.16 , Issue.2 , pp. 898-924
    • Khattak, S.1    Ramay, N.2    Khan, K.3    Syed, A.4    Khayam, S.5
  • 142
    • 84872116111 scopus 로고    scopus 로고
    • Cloud-based push-styled mobile botnets: A case study of exploiting the cloud to device messaging service
    • S. Zhao et al., "Cloud-based push-styled mobile botnets: A case study of exploiting the cloud to device messaging service," in Proc. 28th ACM Annu. Comput. Security Appl. Conf., 2012, pp. 119-128.
    • (2012) Proc. 28th ACM Annu. Comput. Security Appl. Conf. , pp. 119-128
    • Zhao, S.1
  • 143
    • 84901827682 scopus 로고    scopus 로고
    • Big data analytics framework for peer-to-peer botnet detection using random forests
    • Sep.
    • K. Singh, S. C. Guntuku, A. Thakur, and C. Hota, "Big data analytics framework for peer-to-peer botnet detection using random forests," Inf. Sci., vol. 278, pp. 488-497, Sep. 2014.
    • (2014) Inf. Sci. , vol.278 , pp. 488-497
    • Singh, K.1    Guntuku, S.C.2    Thakur, A.3    Hota, C.4
  • 144
    • 84925840602 scopus 로고    scopus 로고
    • A survey on software-defined networking
    • 1st Quart
    • W. Xia, Y. Wen, C. H. Foh, D. Niyato, and H. Xie, "A survey on software-defined networking," IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 27-51, 1st Quart. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.17 , Issue.1 , pp. 27-51
    • Xia, W.1    Wen, Y.2    Foh, C.H.3    Niyato, D.4    Xie, H.5
  • 145
    • 84906715175 scopus 로고    scopus 로고
    • A SDN-oriented DDoS blocking scheme for botnet-based attacks
    • S. Lim, J. Ha, H. Kim, Y. Kim, and S. Yang, "A SDN-oriented DDoS blocking scheme for botnet-based attacks," in Proc. IEEE 6th ICUFN, 2014, pp. 63-68.
    • (2014) Proc. IEEE 6th ICUFN , pp. 63-68
    • Lim, S.1    Ha, J.2    Kim, H.3    Kim, Y.4    Yang, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.