-
1
-
-
84860393847
-
Resource sharing optimization for device-to-device communication underlaying cellular networks
-
Aug.
-
C.-H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, "Resource sharing optimization for device-to-device communication underlaying cellular networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2752-2763, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2752-2763
-
-
Yu, C.-H.1
Doppler, K.2
Ribeiro, C.B.3
Tirkkonen, O.4
-
2
-
-
84901445861
-
MIFS-ND: A mutual information-based feature selection method
-
Oct.
-
N. Hoque, D. Bhattacharyya, and J. Kalita, "MIFS-ND: A mutual information-based feature selection method," Expert Syst. Appl., vol. 41, no. 14, pp. 6371-6385, Oct. 2014.
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.14
, pp. 6371-6385
-
-
Hoque, N.1
Bhattacharyya, D.2
Kalita, J.3
-
4
-
-
70449466618
-
A survey of botnet and botnet detection
-
M. Feily, A. Shahrestani, and S. Ramadass, "A survey of botnet and botnet detection," in Proc. IEEE 3rd Int. Conf. Emerging Security Inf., Syst. Technol. SECURWARE, 2009, pp. 268-273.
-
(2009)
Proc. IEEE 3rd Int. Conf. Emerging Security Inf., Syst. Technol. SECURWARE
, pp. 268-273
-
-
Feily, M.1
Shahrestani, A.2
Ramadass, S.3
-
5
-
-
66249147541
-
A survey of botnet technology and defenses
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, "A survey of botnet technology and defenses," in Proc. IEEE CATCH, 2009, pp. 299-304.
-
(2009)
Proc. IEEE CATCH
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
6
-
-
77958527473
-
A taxonomy of botnet detection techniques
-
H. R. Zeidanloo, M. J. Z. Shooshtari, P. V. Amoli, M. Safari, and M. Zamani, "A taxonomy of botnet detection techniques," in Proc. IEEE 3rd ICCSIT, 2010, vol. 2, pp. 158-162.
-
(2010)
Proc. IEEE 3rd ICCSIT
, vol.2
, pp. 158-162
-
-
Zeidanloo, H.R.1
Shooshtari, M.J.Z.2
Amoli, P.V.3
Safari, M.4
Zamani, M.5
-
7
-
-
84862975193
-
A survey on latest botnet attack and defense
-
L. Zhang, S. Yu, D. Wu, and P. Watters, "A survey on latest botnet attack and defense," in Proc. IEEE 10th Int. Conf. TrustCom, 2011, pp. 53-60.
-
(2011)
Proc. IEEE 10th Int. Conf. TrustCom
, pp. 53-60
-
-
Zhang, L.1
Yu, S.2
Wu, D.3
Watters, P.4
-
8
-
-
84885213527
-
Survey and taxonomy of botnet research through life-cycle
-
Aug.
-
R. A. Rodríguez-Gómez, G. Mació-Fernóndez, and P. García-Teodoro, "Survey and taxonomy of botnet research through life-cycle," ACM CSUR, vol. 45, no. 4, p. 45, Aug. 2013.
-
(2013)
ACM CSUR
, vol.45
, Issue.4
, pp. 45
-
-
Rodríguez-Gómez, R.A.1
Mació-Fernóndez, G.2
García-Teodoro, P.3
-
9
-
-
84875223281
-
Botnets: A survey
-
Feb.
-
S. S. Silva, R. M. Silva, R. C. Pinto, and R. M. Salles, "Botnets: A survey," Comput. Netw., vol. 57, no. 2, pp. 378-403, Feb. 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.2
, pp. 378-403
-
-
Silva, S.S.1
Silva, R.M.2
Pinto, R.C.3
Salles, R.M.4
-
10
-
-
68949173234
-
Taxonomies of attacks and vulnerabilities in computer systems
-
1st Quart
-
V. Igure and R. Williams, "Taxonomies of attacks and vulnerabilities in computer systems," IEEE Commun. Surveys Tuts., vol. 10, no. 1, pp. 6-19, 1st Quart. 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.1
, pp. 6-19
-
-
Igure, V.1
Williams, R.2
-
11
-
-
30344436961
-
Monitoring the macroscopic effect of DDoS flooding attacks
-
Oct.-Dec.
-
J. Yuan and K. Mills, "Monitoring the macroscopic effect of DDoS flooding attacks," IEEE Trans. Depend. Secure Comput., vol. 2, no. 4, pp. 324-335, Oct.-Dec. 2005.
-
(2005)
IEEE Trans. Depend. Secure Comput.
, vol.2
, Issue.4
, pp. 324-335
-
-
Yuan, J.1
Mills, K.2
-
13
-
-
84872569785
-
Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art
-
Jul.
-
E. Alomari, S. Manickam, B. Gupta, S. Karuppayah, and R. Alfaris, "Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art," Int. J. Comput. Appl., vol. 49, no. 7, pp. 24-32, Jul. 2012.
-
(2012)
Int. J. Comput. Appl.
, vol.49
, Issue.7
, pp. 24-32
-
-
Alomari, E.1
Manickam, S.2
Gupta, B.3
Karuppayah, S.4
Alfaris, R.5
-
14
-
-
84879127257
-
LOIC will tear us apart the impact of tool design and media portrayals in the success of activist DDoS attacks
-
M. Sauter, "LOIC will tear us apart the impact of tool design and media portrayals in the success of activist DDoS attacks," Amer. Behavioral Sci., vol. 57, no. 7, pp. 983-1007, 2013.
-
(2013)
Amer. Behavioral Sci.
, vol.57
, Issue.7
, pp. 983-1007
-
-
Sauter, M.1
-
15
-
-
84996426886
-
Botnet communication topologies
-
G. Ollmann, "Botnet communication topologies," Retrieved Sep., vol. 30, pp. 1-7, 2009.
-
(2009)
Retrieved Sep.
, vol.30
, pp. 1-7
-
-
Ollmann, G.1
-
16
-
-
84884857545
-
ZHT: A light-weight reliable persistent dynamic scalable zero-hop distributed hash table
-
T. Li et al., "ZHT: A light-weight reliable persistent dynamic scalable zero-hop distributed hash table," in Proc IEEE IPDPS, 2013, pp. 775-787.
-
(2013)
Proc IEEE IPDPS
, pp. 775-787
-
-
Li, T.1
-
17
-
-
0034775826
-
A scalable content-addressable network
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A scalable content-addressable network," in Proc. ACM, 2001, vol. 31, no. 4, pp. 161-172.
-
(2001)
Proc. ACM
, vol.31
, Issue.4
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
18
-
-
73949147874
-
Pchord: A distributed hash table for P2P network
-
H. Huang, Y. Zheng, H. Chen, and R. Wang, "Pchord: A distributed hash table for P2P network," Front. Electr. Electron. Eng. China, vol. 5, no. 1, pp. 49-58, 2010.
-
(2010)
Front. Electr. Electron. Eng. China
, vol.5
, Issue.1
, pp. 49-58
-
-
Huang, H.1
Zheng, Y.2
Chen, H.3
Wang, R.4
-
19
-
-
57349142855
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
Berlin, Germany: Springer-Verlag
-
A. Rowstron and P. Druschel, "Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems," in Middleware 2001. Berlin, Germany: Springer-Verlag, 2001, pp. 329-350.
-
(2001)
Middleware 2001
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
20
-
-
0742267177
-
Tapestry: A resilient global-scale overlay for service deployment
-
Jan.
-
B. Y. Zhao et al., "Tapestry: A resilient global-scale overlay for service deployment," IEEE J. Sel. Areas Commun., vol. 22, no. 1, pp. 41-53, Jan. 2004.
-
(2004)
IEEE J. Sel. Areas Commun.
, vol.22
, Issue.1
, pp. 41-53
-
-
Zhao, B.Y.1
-
21
-
-
84947235017
-
Kademlia: A peer-to-peer information system based on the XOR metric
-
Berlin, Germany: Springer-Verlag
-
P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the XOR metric," in Peer-to-Peer Systems. Berlin, Germany: Springer-Verlag, 2002, pp. 53-65.
-
(2002)
Peer-to-Peer Systems
, pp. 53-65
-
-
Maymounkov, P.1
Mazieres, D.2
-
23
-
-
84875227155
-
-
[Online]
-
T. Micro, "Worm agobot," 2004. [Online]. Available: http://aboutthreats. trendmicro.com/ArchiveMalware.aspx?language=us&name= WORMAGOBOT
-
(2004)
Worm Agobot
-
-
Micro, T.1
-
24
-
-
84969960390
-
-
[Online]
-
T. Microhgj, "Worm sdbot," 2003. [Online]. Available: http://aboutthreats. trendmicro.com/ArchiveMalware.aspx?language=us&name= WORMSDBOT
-
(2003)
Worm Sdbot
-
-
Microhgj, T.1
-
25
-
-
84969986162
-
-
rbot, [Online]
-
rbot, "The Ruby IRC bot." [Online]. Available: http://ruby-rbot.org/
-
The Ruby IRC Bot.
-
-
-
26
-
-
77951447962
-
Botnet: Survey and case study
-
C. Li, W. Jiang, and X. Zou, "Botnet: Survey and case study," in Proc. IEEE 4th Int. Conf. ICICIC, 2009, pp. 1184-1187.
-
(2009)
Proc. IEEE 4th Int. Conf. ICICIC
, pp. 1184-1187
-
-
Li, C.1
Jiang, W.2
Zou, X.3
-
30
-
-
79551627401
-
Analysis of a botnet takeover
-
Jan./Feb.
-
B. Stone-Gross et al., "Analysis of a botnet takeover," IEEE Security Privacy, vol. 9, no. 1, pp. 64-72, Jan./Feb. 2011.
-
(2011)
IEEE Security Privacy
, vol.9
, Issue.1
, pp. 64-72
-
-
Stone-Gross, B.1
-
31
-
-
49049107082
-
Analysis of the storm and nugache trojans: P2P is here
-
S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich, "Analysis of the storm and nugache trojans: P2P is here," USENIX; login, vol. 32, no. 6, pp. 18-27, 2007.
-
(2007)
USENIX; Login
, vol.32
, Issue.6
, pp. 18-27
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
32
-
-
85076932663
-
Studying spamming botnets using botlab
-
J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy, "Studying spamming botnets using botlab" in Proc. NSDI, 2009, vol. 9, pp. 291-306.
-
(2009)
Proc. NSDI
, vol.9
, pp. 291-306
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
33
-
-
84969946540
-
-
[Online]
-
McAfee, "Cutall" 2015. [Online]. Available: http://vil.nai.com/vil/content/v-144515.htm
-
(2015)
Cutall
-
-
-
34
-
-
77958544372
-
Development of GTBoT, a high performance and modular indoor robot
-
G. Macesanu, T. Codas, C. Suliman, and B. Tarnauca, "Development of GTBoT, a high performance and modular indoor robot," in Proc. IEEE IEEE Int. Conf. AQTR, 2010, vol. 1, pp. 1-6.
-
(2010)
Proc. IEEE IEEE Int. Conf. AQTR
, vol.1
, pp. 1-6
-
-
Macesanu, G.1
Codas, T.2
Suliman, C.3
Tarnauca, B.4
-
36
-
-
49949094072
-
Traffic aggregation for malware detection
-
Berlin, Germany: Springer-Verlag
-
T.-F. Yen and M. K. Reiter, "Traffic aggregation for malware detection," in Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin, Germany: Springer-Verlag, 2008, pp. 207-227.
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 207-227
-
-
Yen, T.-F.1
Reiter, M.K.2
-
37
-
-
70350650293
-
Know your enemy: Tracking botnets
-
Ann Arbor, MI, USA
-
P. Bacher, T. Holz, M. Kotter, and G. Wicherski, "Know your enemy: Tracking botnets," The Honeynets Project, Ann Arbor, MI, USA, 2005.
-
(2005)
The Honeynets Project
-
-
Bacher, P.1
Holz, T.2
Kotter, M.3
Wicherski, G.4
-
39
-
-
84888328281
-
Phishing detection: A literature survey
-
4th Quart
-
M. Khonji, Y. Iraqi, and A. Jones, "Phishing detection: A literature survey," IEEE Commun. Surveys Tuts., vol. 15, no. 4, pp. 2091-2121, 4th Quart. 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.4
, pp. 2091-2121
-
-
Khonji, M.1
Iraqi, Y.2
Jones, A.3
-
40
-
-
84969921992
-
New massive botnet twice the size of storm
-
San Francisco, CA, USA: Dark Reading
-
K. Higgins, "New massive botnet twice the size of storm," in Retrieved May. San Francisco, CA, USA: Dark Reading, vol. 13, 2008.
-
(2008)
Retrieved May
, vol.13
-
-
Higgins, K.1
-
41
-
-
84908881340
-
-
Ph.D. dissertation, Techn. Univ. Denmark, Denmark, DTU, DK-2800 Kgs. Lyngby
-
L. Trolle Borup, "Peer-to-peer botnets: A case study on waledac," Ph.D. dissertation, Techn. Univ. Denmark, Denmark, DTU, DK-2800 Kgs. Lyngby, 2009.
-
(2009)
Peer-to-peer Botnets: A Case Study on Waledac
-
-
Trolle Borup, L.1
-
42
-
-
80054026693
-
-
Secure Works, Atlanta, GA, USA, [Online]
-
J. Stewart, "Spam botnets to watch in 2009," Secure Works, Atlanta, GA, USA, 2009. [Online]. Available: http://www.secureworks.com/research/threats/botnets2009
-
(2009)
Spam Botnets to Watch in 2009
-
-
Stewart, J.1
-
43
-
-
84969946244
-
-
Symantec Corp., Atlanta, GA, USA
-
M. Intelligence, "Annual security report," Symantec Corp., Atlanta, GA, USA, 2010.
-
(2010)
Annual Security Report
-
-
Intelligence, M.1
-
44
-
-
85015508077
-
The war against botnets
-
Feb.
-
S. Greengard, "The war against botnets," Commun. ACM, vol. 55, no. 2, pp. 16-18, Feb. 2012.
-
(2012)
Commun. ACM
, vol.55
, Issue.2
, pp. 16-18
-
-
Greengard, S.1
-
46
-
-
84880818606
-
S-URL flux: A novel c&c protocol for mobile botnets
-
Berlin, Germany: Springer-Verlag
-
W. Shuai, C. Xiang, L. Peng, and L. Dan, "S-URL flux: A novel c&c protocol for mobile botnets," in Trustworthy Computing and Services. Berlin, Germany: Springer-Verlag, 2013, pp. 412-419.
-
(2013)
Trustworthy Computing and Services
, pp. 412-419
-
-
Shuai, W.1
Xiang, C.2
Peng, L.3
Dan, L.4
-
47
-
-
84873712223
-
A survey on security for mobile devices
-
1st Quart
-
M. La Polla, F. Martinelli, and D. Sgandurra, "A survey on security for mobile devices," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 446-471, 1st Quart. 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 446-471
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
48
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proc. 1st ACM Workshop Security Privacy Smartphones Mobile Devices, 2011, pp. 3-14.
-
(2011)
Proc. 1st ACM Workshop Security Privacy Smartphones Mobile Devices
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
49
-
-
85084094893
-
Andbot: Towards advanced mobile botnets
-
USENIX Association
-
C. Xiang, F. Binxing, Y. Lihua, L. Xiaoyi, and Z. Tianning, "Andbot: Towards advanced mobile botnets," in Proc. 4th USENIX Conf. Large-Scale Exploits Emergent Threats, USENIX Association, 2011, pp. 11-11.
-
(2011)
Proc. 4th USENIX Conf. Large-Scale Exploits Emergent Threats
, pp. 11
-
-
Xiang, C.1
Binxing, F.2
Lihua, Y.3
Xiaoyi, L.4
Tianning, Z.5
-
50
-
-
84875695278
-
Mobots: A new generation of botnets on mobile devices and networks
-
M. Eslahi, R. Salleh, and N. B. Anuar, "Mobots: A new generation of botnets on mobile devices and networks," in Proc. IEEE ISCAIE, 2012, pp. 262-266.
-
(2012)
Proc. IEEE ISCAIE
, pp. 262-266
-
-
Eslahi, M.1
Salleh, R.2
Anuar, N.B.3
-
51
-
-
84869222883
-
Android botnets on the rise: Trends and characteristics
-
H. Pieterse and M. S. Olivier, "Android botnets on the rise: Trends and characteristics," in Proc. IEEE ISSA, 2012, pp. 1-5.
-
(2012)
Proc. IEEE ISSA
, pp. 1-5
-
-
Pieterse, H.1
Olivier, M.S.2
-
54
-
-
84860677644
-
Design of SMS commanded-andcontrolled and P2P-structured mobile botnets
-
Y. Zeng, K. G. Shin, and X. Hu, "Design of SMS commanded-andcontrolled and P2P-structured mobile botnets," in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw., 2012, pp. 137-148.
-
(2012)
Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw.
, pp. 137-148
-
-
Zeng, Y.1
Shin, K.G.2
Hu, X.3
-
55
-
-
47649083043
-
Challenges and principles of DDoS defense
-
M. Robinson, J. Mirkovic, M. Schnaider, S. Michel, and P. Reiher, "Challenges and principles of DDoS defense," in Proc. ACM SIGCOMM, 2003, pp. 1-8.
-
(2003)
Proc. ACM SIGCOMM
, pp. 1-8
-
-
Robinson, M.1
Mirkovic, J.2
Schnaider, M.3
Michel, S.4
Reiher, P.5
-
56
-
-
84888391622
-
A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
-
4th Quart
-
S. T. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," IEEE Commun. Surveys Tuts., vol. 15, no. 4, pp. 2046-2069, 4th Quart. 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.4
, pp. 2046-2069
-
-
Zargar, S.T.1
Joshi, J.2
Tipper, D.3
-
58
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
Jul.-Sep.
-
J. Mirkovic and P. Reiher, "D-WARD: A source-end defense against flooding denial-of-service attacks," IEEE Trans. Depend. Secure Comput., vol. 2, no. 3, pp. 216-232, Jul.-Sep. 2005.
-
(2005)
IEEE Trans. Depend. Secure Comput.
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
59
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets," in Proc. ACM SIGCOMM Comput. Commun. Rev., 2001, vol. 31, no. 4, pp. 15-26.
-
(2001)
Proc. ACM SIGCOMM Comput. Commun. Rev.
, vol.31
, Issue.4
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
60
-
-
41949118967
-
Detecting compromised routers via packet forwarding behavior
-
Mar./Apr.
-
A. T. Mizrak, S. Savage, and K. Marzullo, "Detecting compromised routers via packet forwarding behavior," IEEE Netw., vol. 22, no. 2, pp. 34-39, Mar./Apr. 2008.
-
(2008)
IEEE Netw.
, vol.22
, Issue.2
, pp. 34-39
-
-
Mizrak, A.T.1
Savage, S.2
Marzullo, K.3
-
61
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
Feb./Mar.
-
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Mació-Fernóndez, and E. Vózquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges," Comput. Security, vol. 28, no. 1, pp. 18-28, Feb./Mar. 2009.
-
(2009)
Comput. Security
, vol.28
, Issue.1
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
Mació-Fernóndez, G.3
Vózquez, E.4
-
62
-
-
0043166339
-
Anomaly detection in IP networks
-
Aug.
-
M. Thottan and C. Ji, "Anomaly detection in IP networks," IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
63
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Nov.
-
W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM TiSSEC, vol. 3, no. 4, pp. 227-261, Nov. 2000.
-
(2000)
ACM TiSSEC
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
64
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
Nov.
-
O. Depren, M. Topallar, E. Anarim, and M. K. Ciliz, "An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks," Expert Syst. Appl., vol. 29, no. 4, pp. 713-722, Nov. 2005.
-
(2005)
Expert Syst. Appl.
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
65
-
-
77953145744
-
A survey of internet worm detection and containment
-
1st Quart
-
P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment," IEEE Commun. Surveys Tuts., vol. 10, no. 1, pp. 20-35, 1st Quart. 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.1
, pp. 20-35
-
-
Li, P.1
Salour, M.2
Su, X.3
-
66
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
3rd Quart
-
A. Sperotto et al., "An overview of IP flow-based intrusion detection," IEEE Commun. Surveys Tuts., vol. 12, no. 3, pp. 343-356, 3rd Quart. 2010.
-
(2010)
IEEE Commun. Surveys Tuts.
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
-
67
-
-
84894646147
-
Network anomaly detection: Methods, systems and tools
-
1st Quart
-
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Network anomaly detection: Methods, systems and tools," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 303-336, 1st Quart. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 303-336
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
68
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
2nd Quart
-
K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," IEEE Commun. Surveys Tuts., vol. 13, no. 2, pp. 245-257, 2nd Quart. 2011.
-
(2011)
IEEE Commun. Surveys Tuts.
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.V.3
-
69
-
-
84897441938
-
Detecting distributed denial of service attacks: Methods, tools and future directions
-
M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, and J. K. Kalita, "Detecting distributed denial of service attacks: Methods, tools and future directions," The Comput. J., vol. 57, no. 4, pp. 537-556, 2013.
-
(2013)
The Comput. J.
, vol.57
, Issue.4
, pp. 537-556
-
-
Bhuyan, M.H.1
Kashyap, H.J.2
Bhattacharyya, D.K.3
Kalita, J.K.4
-
70
-
-
84857998109
-
A survey on the application of FPGAS for network infrastructure security
-
4th Quart
-
H. Chen, Y. Chen, and D. H. Summerville, "A survey on the application of FPGAS for network infrastructure security," IEEE Commun. Surveys Tuts., vol. 13, no. 4, pp. 541-561, 4th Quart. 2011.
-
(2011)
IEEE Commun. Surveys Tuts.
, vol.13
, Issue.4
, pp. 541-561
-
-
Chen, H.1
Chen, Y.2
Summerville, D.H.3
-
71
-
-
38149018453
-
DDoS attack detection algorithms based on entropy computing
-
Berlin, Germany: Springer-Verlag
-
L. Li, J. Zhou, and N. Xiao, "DDoS attack detection algorithms based on entropy computing," in Information and Communications Security. Berlin, Germany: Springer-Verlag, 2007, pp. 452-466.
-
(2007)
Information and Communications Security
, pp. 452-466
-
-
Li, L.1
Zhou, J.2
Xiao, N.3
-
72
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to DDoS attack detection and response," in Proc. IEEE DARPA Inf. Surv. Conf. Expo., 2003, vol. 1, pp. 303-314.
-
(2003)
Proc. IEEE DARPA Inf. Surv. Conf. Expo.
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
73
-
-
84885603471
-
Dynamic entropy based DoS attack detection method
-
Oct.
-
Z. Jian-Qi, F. Feng, Y. Ke-xin, and L. Yan-Heng, "Dynamic entropy based DoS attack detection method," Comput. Electr. Eng., vol. 39, no. 7, pp. 2243-2251, Oct. 2013.
-
(2013)
Comput. Electr. Eng.
, vol.39
, Issue.7
, pp. 2243-2251
-
-
Jian-Qi, Z.1
Feng, F.2
Ke-Xin, Y.3
Yan-Heng, L.4
-
74
-
-
58149490850
-
Information theory based detection against network behavior mimicking ddos attacks
-
Apr.
-
S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking ddos attacks," IEEE Commun. Lett., vol. 12, no. 4, pp. 318-321, Apr. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.4
, pp. 318-321
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
-
75
-
-
4143081502
-
A covariance analysis model for DDoS attack detection
-
S. Jin and D. S. Yeung, "A covariance analysis model for DDoS attack detection," in Proc. IEEE Int. Conf. Commun., 2004, vol. 4, pp. 1882-1886.
-
(2004)
Proc. IEEE Int. Conf. Commun.
, vol.4
, pp. 1882-1886
-
-
Jin, S.1
Yeung, D.S.2
-
76
-
-
84860543902
-
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
-
Jun.
-
S. Yu et al., "Discriminating DDoS attacks from flash crowds using flow correlation coefficient," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1073-1080, Jun. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.6
, pp. 1073-1080
-
-
Yu, S.1
-
77
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Feb.
-
X. Yi and Y. Shunzheng, "Monitoring the application-layer DDoS attacks for popular websites," IEEE Trans. Netw., vol. 17, no. 1, pp. 15-25, Feb. 2009.
-
(2009)
IEEE Trans. Netw.
, vol.17
, Issue.1
, pp. 15-25
-
-
Yi, X.1
Shunzheng, Y.2
-
78
-
-
61449197774
-
A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
-
Feb.
-
Y. Xie and S.-Z. Yu, "A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors," IEEE Trans. Netw., vol. 17, no. 1, pp. 54-65, Feb. 2009.
-
(2009)
IEEE Trans. Netw.
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.-Z.2
-
79
-
-
84904888755
-
Attacking DDoS at the source
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," in Proc. 10th IEEE Int. Conf. Netw. Protocols, 2002, pp. 312-321.
-
(2002)
Proc. 10th IEEE Int. Conf. Netw. Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
80
-
-
46749115908
-
Detecting DDoS attacks on ISP networks
-
Citeseer
-
A. Akella, A. Bharambe, M. Reiter, and S. Seshan, "Detecting DDoS attacks on ISP networks," in Proc. 22nd ACM SIGMOD Workshop Manage. Process. Data Streams, Citeseer, 2003, pp. 1-3.
-
(2003)
Proc. 22nd ACM SIGMOD Workshop Manage. Process. Data Streams
, pp. 1-3
-
-
Akella, A.1
Bharambe, A.2
Reiter, M.3
Seshan, S.4
-
81
-
-
33745371142
-
Proactively detecting distributed denial of service attacks using source IP address monitoring
-
Berlin, Germany: Springer-Verlag
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Proactively detecting distributed denial of service attacks using source IP address monitoring," in NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications. Berlin, Germany: Springer-Verlag, 2004, pp. 771-782.
-
(2004)
NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications
, pp. 771-782
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
82
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
Dec.
-
Y. Chen, K. Hwang, and W.-S. Ku, "Collaborative detection of DDoS attacks over multiple network domains," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 12, pp. 1649-1662, Dec. 2007.
-
(2007)
IEEE Trans. Parallel Distrib. Syst.
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
83
-
-
35648969617
-
A denial of service detector based on maximum likelihood detection and the random neural network
-
G. Öke and G. Loukas, "A denial of service detector based on maximum likelihood detection and the random neural network," The Comput. J., vol. 50, no. 6, pp. 717-727, 2007.
-
(2007)
The Comput. J.
, vol.50
, Issue.6
, pp. 717-727
-
-
Öke, G.1
Loukas, G.2
-
84
-
-
65349192442
-
A new detection method for distributed denial-of-service attack traffic based on statistical test
-
C.-L. Chen, "A new detection method for distributed denial-of-service attack traffic based on statistical test," J. UCS, vol. 15, no. 2, pp. 488-504, 2009.
-
(2009)
J. UCS
, vol.15
, Issue.2
, pp. 488-504
-
-
Chen, C.-L.1
-
85
-
-
79551523280
-
Traceback of DDoS attacks using entropy variations
-
Mar.
-
S. Yu, W. Zhou, R. Doss, and W. Jia, "Traceback of DDoS attacks using entropy variations," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 3, pp. 412-425, Mar. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.3
, pp. 412-425
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Jia, W.4
-
86
-
-
84893060840
-
TDPF: A traceback-based distributed packet filter to mitigate spoofed DDoS attacks
-
M. S. Fallah and N. Kahani, "TDPF: A traceback-based distributed packet filter to mitigate spoofed DDoS attacks," Security Commun. Netw., vol. 7, no. 2, pp. 245-264, 2013.
-
(2013)
Security Commun. Netw.
, vol.7
, Issue.2
, pp. 245-264
-
-
Fallah, M.S.1
Kahani, N.2
-
88
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
4th Quart
-
T. T. Nguyen and G. Armitage, "A survey of techniques for internet traffic classification using machine learning," IEEE Commun. Surveys Tuts., vol. 10, no. 4, pp. 56-76, 4th Quart. 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.4
, pp. 56-76
-
-
Nguyen, T.T.1
Armitage, G.2
-
89
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
Sep.
-
T. Shon and J. Moon, "A hybrid machine learning approach to network anomaly detection," Inf. Sci., vol. 177, no. 18, pp. 3799-3821, Sep. 2007.
-
(2007)
Inf. Sci.
, vol.177
, Issue.18
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
90
-
-
79952567907
-
A system approach to network modeling for DDoS detection using a naìve Bayesian classifier
-
R. Vijayasarathy, S. V. Raghavan, and B. Ravindran, "A system approach to network modeling for DDoS detection using a naìve bayesian classifier," in Proc. IEEE 3rd Int. Conf. COMSNETS, 2011, pp. 1-10.
-
(2011)
Proc. IEEE 3rd Int. Conf. COMSNETS
, pp. 1-10
-
-
Vijayasarathy, R.1
Raghavan, S.V.2
Ravindran, B.3
-
91
-
-
33847704184
-
K-means+ID3: A novel method for supervised anomaly detection by cascading K-means clustering and ID3 decision tree learning methods
-
Mar.
-
S. R. Gaddam, V. V. Phoha, and K. S. Balagani, "K-means+ID3: A novel method for supervised anomaly detection by cascading K-means clustering and ID3 decision tree learning methods," IEEE Trans. Knowl. Data Eng., vol. 19, no. 3, pp. 345-354, Mar. 2007.
-
(2007)
IEEE Trans. Knowl. Data Eng.
, vol.19
, Issue.3
, pp. 345-354
-
-
Gaddam, S.R.1
Phoha, V.V.2
Balagani, K.S.3
-
92
-
-
78650707301
-
Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers
-
Apr.
-
M.-Y. Su, "Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers," Expert Syst. Appl., vol. 38, no. 4, pp. 3492-3498, Apr. 2011.
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.4
, pp. 3492-3498
-
-
Su, M.-Y.1
-
93
-
-
80052226808
-
Real time detection and classification of DDoS attacks using enhanced SVM with string kernels
-
A. Ramamoorthi, T. Subbulakshmi, and S. M. Shalinie, "Real time detection and classification of DDoS attacks using enhanced SVM with string kernels," in Proc. IEEE ICRTIT, 2011, pp. 91-96.
-
(2011)
Proc. IEEE ICRTIT
, pp. 91-96
-
-
Ramamoorthi, A.1
Subbulakshmi, T.2
Shalinie, S.M.3
-
94
-
-
84865258778
-
Real time DDoS detection using fuzzy estimators
-
Sep.
-
S. N. Shiaeles, V. Katos, A. S. Karakos, and B. K. Papadopoulos, "Real time DDoS detection using fuzzy estimators," Comput. Security, vol. 31, no. 6, pp. 782-790, Sep. 2012.
-
(2012)
Comput. Security
, vol.31
, Issue.6
, pp. 782-790
-
-
Shiaeles, S.N.1
Katos, V.2
Karakos, A.S.3
Papadopoulos, B.K.4
-
95
-
-
34548118248
-
Offline/realtime traffic classification using semi-supervised learning
-
Oct.
-
J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realtime traffic classification using semi-supervised learning," Perform. Eval., vol. 64, no. 9, pp. 1194-1213, Oct. 2007.
-
(2007)
Perform. Eval.
, vol.64
, Issue.9
, pp. 1194-1213
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
Cohen, I.4
Williamson, C.5
-
96
-
-
33744936042
-
A new DDoS detection model using multiple SVMs and TRA
-
Berlin, Germany: Springer-Verlag
-
J. Seo, C. Lee, T. Shon, K.-H. Cho, and J. Moon, "A new DDoS detection model using multiple SVMs and TRA," in Embedded and Ubiquitous Computing-EUC 2005 Workshops. Berlin, Germany: Springer-Verlag, 2005, pp. 976-985.
-
(2005)
Embedded and Ubiquitous Computing-EUC 2005 Workshops
, pp. 976-985
-
-
Seo, J.1
Lee, C.2
Shon, T.3
Cho, K.-H.4
Moon, J.5
-
97
-
-
16644393989
-
Real-time detection of distributed denialof-service attacks using RBF networks and statistical features
-
Jun.
-
D. Gavrilis and E. Dermatas, "Real-time detection of distributed denialof-service attacks using RBF networks and statistical features," Comput. Netw., vol. 48, no. 2, pp. 235-245, Jun. 2005.
-
(2005)
Comput. Netw.
, vol.48
, Issue.2
, pp. 235-245
-
-
Gavrilis, D.1
Dermatas, E.2
-
98
-
-
33745442482
-
A machine learning framework for network anomaly detection using SVM and GA
-
T. Shon, Y. Kim, C. Lee, and J. Moon, "A machine learning framework for network anomaly detection using SVM and GA," in Proc. IEEE 6th Annu. SMC IAW, 2005, pp. 176-183.
-
(2005)
Proc. IEEE 6th Annu. SMC IAW
, pp. 176-183
-
-
Shon, T.1
Kim, Y.2
Lee, C.3
Moon, J.4
-
99
-
-
77953883563
-
Intrusion detection using data mining techniques
-
M. Ektefa, S. Memar, F. Sidi, and L. S. Affendey, "Intrusion detection using data mining techniques," in Proc. IEEE Int. Conf. Inf. Retrieval Knowl. Manage CAMP, 2010, pp. 200-203.
-
(2010)
Proc. IEEE Int. Conf. Inf. Retrieval Knowl. Manage CAMP
, pp. 200-203
-
-
Ektefa, M.1
Memar, S.2
Sidi, F.3
Affendey, L.S.4
-
100
-
-
50949098638
-
QRP05-4: Internet traffic identification using machine learning
-
J. Erman, A. Mahanti, and M. Arlitt, "QRP05-4: Internet traffic identification using machine learning," in Proc. IEEE GLOBECOM, 2006, pp. 1-6.
-
(2006)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
-
101
-
-
79958207846
-
Nobot: Embedded malware detection for endpoint devices
-
Jun.
-
L. E. Menten, A. Chen, and D. Stiliadis, "Nobot: Embedded malware detection for endpoint devices," Bell Labs Tech. J., vol. 16, no. 1, pp. 155-170, Jun. 2011.
-
(2011)
Bell Labs Tech. J.
, vol.16
, Issue.1
, pp. 155-170
-
-
Menten, L.E.1
Chen, A.2
Stiliadis, D.3
-
102
-
-
85093871360
-
Rishi: Identify bot contaminated hosts by IRC nickname evaluation
-
Botnets, Cambridge, MA, USA
-
J. Goebel and T. Holz, "Rishi: Identify bot contaminated hosts by IRC nickname evaluation," in Proc 1st Conf. 1st Workshop Hot Topics Understand. Botnets, Cambridge, MA, USA, 2007, pp. 8-8.
-
(2007)
Proc 1st Conf. 1st Workshop Hot Topics Understand
, pp. 8
-
-
Goebel, J.1
Holz, T.2
-
103
-
-
84882753373
-
Botnet detection based on network behavior
-
Berlin, Germany: Springer-Verlag
-
W. T. Strayer, D. Lapsely, R. Walsh, and C. Livadas, "Botnet detection based on network behavior," in Botnet Detection. Berlin, Germany: Springer-Verlag, 2008, pp. 1-24.
-
(2008)
Botnet Detection
, pp. 1-24
-
-
Strayer, W.T.1
Lapsely, D.2
Walsh, R.3
Livadas, C.4
-
104
-
-
84861634583
-
Can we beat legitimate cyber behavior mimicking attacks from botnets?
-
S. Yu, S. Guo, and I. Stojmenovic, "Can we beat legitimate cyber behavior mimicking attacks from botnets?" in Proc. IEEE INFOCOM, 2012, pp. 2851-2855.
-
(2012)
Proc. IEEE INFOCOM
, pp. 2851-2855
-
-
Yu, S.1
Guo, S.2
Stojmenovic, I.3
-
106
-
-
55149116358
-
The honeynet project: Data collection tools, infrastructure, archives and analysis
-
D. Watson and J. Riden, "The Honeynet Project: Data collection tools, infrastructure, archives and analysis," in Proc. IEEE WOMBAT Workshop Inf. Security Threats Data Collect. Sharing, 2008, pp. 24-30.
-
(2008)
Proc. IEEE WOMBAT Workshop Inf. Security Threats Data Collect. Sharing
, pp. 24-30
-
-
Watson, D.1
Riden, J.2
-
107
-
-
84898658527
-
-
[Online]
-
J. Ritter, "ngrep-network grep." [Online]. Available: http://packetfactory. openwall.net/projects/ngrep/index.html
-
Ngrep-network Grep.
-
-
Ritter, J.1
-
108
-
-
2642550427
-
-
Lawrence Berkeley Lab., Berkeley, CA, USA
-
V. Jacobson, C. Leres, and S. McCanne, "The tcpdump manual page," Lawrence Berkeley Lab., Berkeley, CA, USA, 1989.
-
(1989)
The Tcpdump Manual Page
-
-
Jacobson, V.1
Leres, C.2
McCanne, S.3
-
109
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson, "The zombie roundup: Understanding, detecting, and disrupting botnets," in Proc. USENIX SRUTI Workshop, 2005, vol. 39, pp. 44-59.
-
(2005)
Proc. USENIX SRUTI Workshop
, vol.39
, pp. 44-59
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
110
-
-
38049035805
-
Botnet detection by monitoring group activities in DNS traffic
-
H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet detection by monitoring group activities in DNS traffic," in Proc. IEEE 7th Int. Conf. CIT, 2007, pp. 715-720.
-
(2007)
Proc. IEEE 7th Int. Conf. CIT
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
-
111
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
Cambridge, MA, USA
-
A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization," in Proc. 1st Conf. 1st Workshop Hot Topics Understand. Botnets, Cambridge, MA, USA, 2007, vol. 7, p. 7.
-
(2007)
Proc. 1st Conf. 1st Workshop Hot Topics Understand. Botnets
, vol.7
, pp. 7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
112
-
-
84888150566
-
Feature selection for detection of peer-to-peer botnet traffic
-
P. Narang, J. M. Reddy, and C. Hota, "Feature selection for detection of peer-to-peer botnet traffic," in Proc. 6th ACM India Comput. Conv., 2013, p. 16.
-
(2013)
Proc. 6th ACM India Comput. Conv.
, pp. 16
-
-
Narang, P.1
Reddy, J.M.2
Hota, C.3
-
113
-
-
78651429288
-
A P2P-botnet detection model and algorithms based on network streams analysis
-
D. Liu, Y. Li, Y. Hu, and Z. Liang, "A P2P-botnet detection model and algorithms based on network streams analysis," in Proc. IEEE Int. Conf. FITME, 2010, vol. 1, pp. 55-58.
-
(2010)
Proc. IEEE Int. Conf. FITME
, vol.1
, pp. 55-58
-
-
Liu, D.1
Li, Y.2
Hu, Y.3
Liang, Z.4
-
114
-
-
85084094913
-
Towards automated detection of peer-to-peer botnets: On the limits of local approaches
-
M. Jelasity and V. Bilicki, "Towards automated detection of peer-to-peer botnets: On the limits of local approaches," in Proc. USENIX Workshop LEET, 2009, p. 3.
-
(2009)
Proc. USENIX Workshop LEET
, pp. 3
-
-
Jelasity, M.1
Bilicki, V.2
-
115
-
-
85059753615
-
Botgrep: Finding P2P bots with structured graph analysis
-
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N. Borisov, "Botgrep: Finding P2P bots with structured graph analysis," in Proc. USENIX Security Symp., 2010, pp. 95-110.
-
(2010)
Proc. USENIX Security Symp.
, pp. 95-110
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
116
-
-
67249151513
-
Botnets detection based on IRCcommunity
-
W. Lu and A. A. Ghorbani, "Botnets detection based on IRCcommunity," in Proc. IEEE GLOBECOM, 2008, pp. 1-5.
-
(2008)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Lu, W.1
Ghorbani, A.A.2
-
117
-
-
77955382717
-
A novel IRC botnet detection method based on packet size sequence
-
X. Ma et al., "A novel IRC botnet detection method based on packet size sequence," in Proc. IEEE ICC, 2010, pp. 1-5.
-
(2010)
Proc. IEEE ICC
, pp. 1-5
-
-
Ma, X.1
-
118
-
-
55349090681
-
IRC traffic analysis for botnet detection
-
C. Mazzariello, "IRC traffic analysis for botnet detection," in Proc. IEEE 4th Int. Conf. ISIAS, 2008, pp. 318-323.
-
(2008)
Proc. IEEE 4th Int. Conf. ISIAS
, pp. 318-323
-
-
Mazzariello, C.1
-
119
-
-
60349104800
-
The activity analysis of malicious HTTP-based botnets using degree of periodic repeatability
-
J.-S. Lee, H. Jeong, J.-H. Park, M. Kim, and B.-N. Noh, "The activity analysis of malicious HTTP-based botnets using degree of periodic repeatability," in Proc. IEEE Int. Conf. SECTECH, 2008, pp. 83-86.
-
(2008)
Proc. IEEE Int. Conf. SECTECH
, pp. 83-86
-
-
Lee, J.-S.1
Jeong, H.2
Park, J.-H.3
Kim, M.4
Noh, B.-N.5
-
120
-
-
84872102390
-
Disclosure: Detecting botnet command and control servers through large-scale netflow analysis
-
L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel, "Disclosure: Detecting botnet command and control servers through large-scale netflow analysis," in Proc. 28th ACM Annu. Comput. Security Appl. Conf., 2012, pp. 129-138.
-
(2012)
Proc. 28th ACM Annu. Comput. Security Appl. Conf.
, pp. 129-138
-
-
Bilge, L.1
Balzarotti, D.2
Robertson, W.3
Kirda, E.4
Kruegel, C.5
-
121
-
-
85175133385
-
-
College Comput., Georgia Inst. Technol., Atlanta, GA, USA
-
G. Gu, J. Zhang, and W. Lee, "Botsniffer: Detecting botnet command and control channels in network traffic," College Comput., Georgia Inst. Technol., Atlanta, GA, USA, 2008.
-
(2008)
Botsniffer: Detecting Botnet Command and Control Channels in Network Traffic
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
123
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
S. Yadav, A. K. K. Reddy, A. Reddy, and S. Ranjan, "Detecting algorithmically generated malicious domain names," in Proc. 10th ACM SIGCOMM Conf. Internet Meas., 2010, pp. 48-61.
-
(2010)
Proc. 10th ACM SIGCOMM Conf. Internet Meas.
, pp. 48-61
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.3
Ranjan, S.4
-
124
-
-
84904118329
-
Phoenix: DGAbased botnet tracking and intelligence
-
Berlin, Germany: Springer-Verlag
-
S. Schiavoni, F. Maggi, L. Cavallaro, and S. Zanero, "Phoenix: DGAbased botnet tracking and intelligence," in Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin, Germany: Springer-Verlag, 2014, pp. 192-211.
-
(2014)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 192-211
-
-
Schiavoni, S.1
Maggi, F.2
Cavallaro, L.3
Zanero, S.4
-
125
-
-
65249176218
-
An as-level overlay network for IP traceback
-
Jan./Feb.
-
A. Castelucio, A. Ziviani, and R. M. Salles, "An as-level overlay network for IP traceback," IEEE Netw., vol. 23, no. 1, pp. 36-41, Jan./Feb. 2009.
-
(2009)
IEEE Netw.
, vol.23
, Issue.1
, pp. 36-41
-
-
Castelucio, A.1
Ziviani, A.2
Salles, R.M.3
-
126
-
-
0036947597
-
Single-packet IP traceback
-
Dec.
-
A. C. Snoeren et al., "Single-packet IP traceback," IEEE ToN, vol. 10, no. 6, pp. 721-734, Dec. 2002.
-
(2002)
IEEE ToN
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
-
127
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
H. Burch and B. Cheswick, "Tracing anonymous packets to their approximate source," in LISA, 2000, pp. 319-327.
-
(2000)
LISA
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
128
-
-
0033650584
-
Practical network support for IP traceback
-
Oct.
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," ACM SIGCOMM Comput. Commun. Rev., vol. 30, no. 4, pp. 295-306, Oct. 2000.
-
(2000)
ACM SIGCOMM Comput. Commun. Rev.
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
130
-
-
67649889403
-
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
-
Apr.
-
Y. Xiang, W. Zhou, and M. Guo, "Flexible deterministic packet marking: An IP traceback system to find the real source of attacks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567-580, Apr. 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.4
, pp. 567-580
-
-
Xiang, Y.1
Zhou, W.2
Guo, M.3
-
131
-
-
84949109093
-
Topology based packet marking for IP traceback
-
Citeseer
-
H. A. Alwis, R. C. Doss, P. S. Hewage, and M. U. Chowdhury, "Topology based packet marking for IP traceback," in Proc. ATNAC, Citeseer, 2006, pp. 224-228.
-
(2006)
Proc. ATNAC
, pp. 224-228
-
-
Alwis, H.A.1
Doss, R.C.2
Hewage, P.S.3
Chowdhury, M.U.4
-
132
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Jul.
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, Jul. 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
133
-
-
81255172277
-
A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques
-
A. Mishra, B. Gupta, and R. C. Joshi, "A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques," in Proc. IEEE EISIC, 2011, pp. 286-289.
-
(2011)
Proc. IEEE EISIC
, pp. 286-289
-
-
Mishra, A.1
Gupta, B.2
Joshi, R.C.3
-
134
-
-
33750926287
-
A fault tolerance mechanism for network intrusion detection system based on intelligent agents (NIDIA)
-
L. Siqueira and Z. Abdelouahab, "A fault tolerance mechanism for network intrusion detection system based on intelligent agents (NIDIA)," in Proc. IEEE 4th Workshop SEUS 2nd Int. WCCIA, 2006, pp. 1-6.
-
(2006)
Proc. IEEE 4th Workshop SEUS 2nd Int. WCCIA
, pp. 1-6
-
-
Siqueira, L.1
Abdelouahab, Z.2
-
135
-
-
0742317706
-
SITAR: A scalable intrusion-tolerant architecture for distributed services
-
F. Wang et al., "SITAR: A scalable intrusion-tolerant architecture for distributed services," in Proc. Workshop Inf. Assur. Security, 2003, vol. 1, p. 1100.
-
(2003)
Proc. Workshop Inf. Assur. Security
, vol.1
, pp. 1100
-
-
Wang, F.1
-
136
-
-
34548176572
-
Secure, resilient computing clusters: Self-cleansing intrusion tolerance with hardware enforced security (SCIT/HES)
-
D. Arsenault, A. Sood, and Y. Huang, "Secure, resilient computing clusters: Self-cleansing intrusion tolerance with hardware enforced security (SCIT/HES)," in Proc. IEEE 2nd Int. Conf. ARES, 2007, pp. 343-350.
-
(2007)
Proc. IEEE 2nd Int. Conf. ARES
, pp. 343-350
-
-
Arsenault, D.1
Sood, A.2
Huang, Y.3
-
137
-
-
84881247246
-
Intrusion-tolerant architectures: Concepts and design
-
Berlin, Germany: Springer-Verlag
-
P. E. Veríssimo, N. F. Neves, and M. P. Correia, "Intrusion-tolerant architectures: Concepts and design," in Architecting Dependable Systems. Berlin, Germany: Springer-Verlag, 2003, pp. 3-36.
-
(2003)
Architecting Dependable Systems
, pp. 3-36
-
-
Veríssimo, P.E.1
Neves, N.F.2
Correia, M.P.3
-
138
-
-
34748899427
-
Fireflies: Scalable support for intrusion-tolerant network overlays
-
Oct.
-
H. Johansen, A. Allavena, and R. Van Renesse, "Fireflies: Scalable support for intrusion-tolerant network overlays," ACM SIGOPS Oper. Syst. Rev., vol. 40, no. 4, pp. 3-13, Oct. 2006.
-
(2006)
ACM SIGOPS Oper. Syst. Rev.
, vol.40
, Issue.4
, pp. 3-13
-
-
Johansen, H.1
Allavena, A.2
Van Renesse, R.3
-
139
-
-
84969946466
-
-
Internet Draft, Lincroft, NJ, USA, Tech. Rep., Oct.
-
A. Siddiqui, D. Romascanu, E. Golovinsky, and R. Smith, "Real-time application quality of service monitoring (RAQMON) MIB," Internet Draft, Lincroft, NJ, USA, Tech. Rep., Oct. 2002.
-
(2002)
Real-time Application Quality of Service Monitoring (RAQMON) MIB
-
-
Siddiqui, A.1
Romascanu, D.2
Golovinsky, E.3
Smith, R.4
-
140
-
-
84858737786
-
Securing cloud computing environment against DDoS attacks
-
B. Joshi, A. S. Vijayan, and B. K. Joshi, "Securing cloud computing environment against DDoS attacks," in Proc. IEEE ICCCI, 2012, pp. 1-5.
-
(2012)
Proc. IEEE ICCCI
, pp. 1-5
-
-
Joshi, B.1
Vijayan, A.S.2
Joshi, B.K.3
-
141
-
-
84901245716
-
A taxonomy of botnet behavior, detection, and defense
-
2nd Quart
-
S. Khattak, N. Ramay, K. Khan, A. Syed, and S. Khayam, "A taxonomy of botnet behavior, detection, and defense," IEEE Commun. Surveys Tuts., vol. 16, no. 2, pp. 898-924, 2nd Quart. 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.2
, pp. 898-924
-
-
Khattak, S.1
Ramay, N.2
Khan, K.3
Syed, A.4
Khayam, S.5
-
142
-
-
84872116111
-
Cloud-based push-styled mobile botnets: A case study of exploiting the cloud to device messaging service
-
S. Zhao et al., "Cloud-based push-styled mobile botnets: A case study of exploiting the cloud to device messaging service," in Proc. 28th ACM Annu. Comput. Security Appl. Conf., 2012, pp. 119-128.
-
(2012)
Proc. 28th ACM Annu. Comput. Security Appl. Conf.
, pp. 119-128
-
-
Zhao, S.1
-
143
-
-
84901827682
-
Big data analytics framework for peer-to-peer botnet detection using random forests
-
Sep.
-
K. Singh, S. C. Guntuku, A. Thakur, and C. Hota, "Big data analytics framework for peer-to-peer botnet detection using random forests," Inf. Sci., vol. 278, pp. 488-497, Sep. 2014.
-
(2014)
Inf. Sci.
, vol.278
, pp. 488-497
-
-
Singh, K.1
Guntuku, S.C.2
Thakur, A.3
Hota, C.4
-
144
-
-
84925840602
-
A survey on software-defined networking
-
1st Quart
-
W. Xia, Y. Wen, C. H. Foh, D. Niyato, and H. Xie, "A survey on software-defined networking," IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 27-51, 1st Quart. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.1
, pp. 27-51
-
-
Xia, W.1
Wen, Y.2
Foh, C.H.3
Niyato, D.4
Xie, H.5
-
145
-
-
84906715175
-
A SDN-oriented DDoS blocking scheme for botnet-based attacks
-
S. Lim, J. Ha, H. Kim, Y. Kim, and S. Yang, "A SDN-oriented DDoS blocking scheme for botnet-based attacks," in Proc. IEEE 6th ICUFN, 2014, pp. 63-68.
-
(2014)
Proc. IEEE 6th ICUFN
, pp. 63-68
-
-
Lim, S.1
Ha, J.2
Kim, H.3
Kim, Y.4
Yang, S.5
|