메뉴 건너뛰기




Volumn , Issue , 2012, Pages 491-506

From throw-away traffic to bots: Detecting the rise of DGA-based malware

Author keywords

[No Author keywords available]

Indexed keywords

BOTNET; COMMAND AND CONTROL SYSTEMS; COMPUTER VIRUSES; RANDOM NUMBER GENERATION; REVERSE ENGINEERING; TECHNOLOGY TRANSFER; VIRUSES;

EID: 85068676628     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (488)

References (46)
  • 5
    • 85076212585 scopus 로고    scopus 로고
    • BankPatch. Trojan.Bankpatch.C. http://www.symantec.com/security_ response/writeup.jsp?docid= 2008-081817-1808-99&tabid=2, 2009.
    • (2009) Trojan.Bankpatch.C
  • 8
    • 85076199411 scopus 로고    scopus 로고
    • R. Finones. Virus:Win32/Expiro.Z. http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx? Name=Virus%3AWin32%2FExpiro.Z, 2011.
    • (2011) Virus:Win32/Expiro.Z.
    • Finones, R.1
  • 13
    • 85075837457 scopus 로고    scopus 로고
    • Bot-Miner: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. Bot-Miner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In USENIX Security, 2008.
    • (2008) USENIX Security
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 24
    • 0001820920 scopus 로고    scopus 로고
    • X-means: Extending k-means with efficient estimation of the number of clusters
    • San Francisco, CA, USA, Morgan Kaufmann Publishers Inc
    • D. Pelleg and A. W. Moore. X-means: Extending k-means with efficient estimation of the number of clusters. In Proceedings of the Seventeenth International Conference on Machine Learning, ICML ’00, pages 727–734, San Francisco, CA, USA, 2000. Morgan Kaufmann Publishers Inc.
    • (2000) Proceedings of the Seventeenth International Conference on Machine Learning, ICML ’00 , pp. 727-734
    • Pelleg, D.1    Moore, A.W.2
  • 26
    • 70349682715 scopus 로고    scopus 로고
    • Inside risks: Reflections on conficker
    • October
    • P. Porras. Inside risks: Reflections on conficker. Communications of the ACM, 52:23–24, October 2009.
    • (2009) Communications of the ACM , vol.52 , pp. 23-24
    • Porras, P.1
  • 32
    • 85076207392 scopus 로고    scopus 로고
    • SOPHOS. Mal/Simda-C. http://www.sophos.com/en-us/ threat-center/threat-analyses/ viruses-and-spyware/MalSimda-C/ detailed-analysis.aspx, 2012.
    • (2012) Mal/Simda-C
  • 35
    • 49049107082 scopus 로고    scopus 로고
    • Analysis of the storm and nugache trojans: P2p is here
    • December
    • S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the storm and nugache trojans: P2P is here. In USENIX;login:, vol. 32, no. 6, December 2007.
    • (2007) USENIX;Login , vol.32 , Issue.6
    • Stover, S.1    Dittrich, D.2    Hernandez, J.3    Dietrich, S.4
  • 36
    • 77955861102 scopus 로고    scopus 로고
    • Are your hosts trading or plotting? Telling P2P file-sharing and bots apart
    • T.-F. Yen and M. K. Reiter. Are your hosts trading or plotting? Telling P2P file-sharing and bots apart. In ICDCS, 2010.
    • (2010) ICDCS
    • Yen, T.-F.1    Reiter, M.K.2
  • 38
    • 85052027011 scopus 로고    scopus 로고
    • Wikipedia. The storm botnet. http://en.wikipedia.org/wiki/Storm_botnet, 2010.
    • (2010) The Storm Botnet
  • 41
    • 85076214483 scopus 로고    scopus 로고
    • J. Wong. Trojan:Java/Boonana. http://www.microsoft.com/security/ portal/Threat/Encyclopedia/Entry. aspx?Name=Trojan%3AJava%2FBoonana, 2011.
    • (2011) Trojan:Java/Boonana
    • Wong, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.