메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Towards automated detection of peer-to-peer botnets: On the limits of local approaches

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; BOTNET; COMPUTER VIRUSES;

EID: 85084094913     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (26)

References (27)
  • 2
    • 51949119334 scopus 로고    scopus 로고
    • Botnet detection and response: The network is the infection, 2005
    • DAGON, D. Botnet detection and response: The network is the infection, 2005. OARC Workshop presentation.
    • OARC Workshop Presentation
    • Dagon, D.1
  • 8
    • 77951264808 scopus 로고    scopus 로고
    • Graption: Automated detection of P2P applications using traffic dispersion graphs (TDGs)
    • Department of Computer Science and Engineering, University of California, Riverside, June
    • ILIOFOTOU, M., PAPPU, P., FALOUTSOS, M., MITZENMACHER, M., VARGHESE, G., AND KIM, H. Graption: Automated detection of P2P applications using traffic dispersion graphs (TDGs). Tech. Rep. UCR-CS-2008-06080, Department of Computer Science and Engineering, University of California, Riverside, June 2008.
    • (2008) Tech. Rep. UCR-CS-2008-06080
    • Iliofotou, M.1    Pappu, P.2    Faloutsos, M.3    Mitzenmacher, M.4    Varghese, G.5    Kim, H.6
  • 9
    • 33745778859 scopus 로고    scopus 로고
    • T-Man: Gossip-based overlay topology management
    • Engineering Self-Organising Systems: Third International Workshop (ESOA 2005), Revised Selected Papers, S. A. Brueckner, G. Di Marzo Serugendo, D. Hales, and F. Zambonelli, Eds.,. of Springer-Verlag
    • JELASITY, M., AND BABAOGLU, O. T-Man: Gossip-based overlay topology management. In Engineering Self-Organising Systems: Third International Workshop (ESOA 2005), Revised Selected Papers (2006), S. A. Brueckner, G. Di Marzo Serugendo, D. Hales, and F. Zambonelli, Eds., vol. 3910 of Lecture Notes in Computer Science, Springer-Verlag, pp. 1–15.
    • (2006) Lecture Notes in Computer Science , vol.3910 , pp. 1-15
    • Jelasity, M.1    Babaoglu, O.2
  • 11
    • 0003935111 scopus 로고    scopus 로고
    • The traveling salesman problem: A case study in local optimization
    • E. H. L. Aarts and J. K. Lenstra, Eds. John Wiley and Sons
    • JOHNSON, D. S., AND MCGEOCH, L. A. The traveling salesman problem: A case study in local optimization. In Local Search in Combinatorial Optimization, E. H. L. Aarts and J. K. Lenstra, Eds. John Wiley and Sons, 1997, pp. 215–310.
    • (1997) Local Search in Combinatorial Optimization , pp. 215-310
    • Johnson, D.S.1    McGeoch, L.A.2
  • 14
    • 0343441557 scopus 로고    scopus 로고
    • Navigation in a small world
    • KLEINBERG, J. Navigation in a small world. Nature 406 (2000), 845.
    • (2000) Nature , vol.406 , pp. 845
    • Kleinberg, J.1
  • 15
    • 34548853976 scopus 로고    scopus 로고
    • The wireless epidemic
    • News and Views
    • KLEINBERG, J. The wireless epidemic. Nature 449 (2007), 287–288. News and Views.
    • (2007) Nature , vol.449 , pp. 287-288
    • Kleinberg, J.1
  • 22
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • NGUYEN, T. T. T., AND ARMITAGE, G. A survey of techniques for Internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials 10, 4 (2008), 56–76.
    • (2008) IEEE Communications Surveys and Tutorials , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.T.T.1    Armitage, G.2
  • 26
    • 84882753373 scopus 로고    scopus 로고
    • Botnet detection based on network behavior
    • W. Lee, C. Wang, and D. Dagon, Eds.,. of Advances in Information Security. Springer
    • STRAYER, W. T., LAPSELY, D., WALSH, R., AND LIVADAS, C. Botnet detection based on network behavior. In Botnet Detection: Countering the Largest Security Threat, W. Lee, C. Wang, and D. Dagon, Eds., vol. 36 of Advances in Information Security. Springer, 2008, pp. 1–24.
    • (2008) Botnet Detection: Countering the Largest Security Threat , vol.36 , pp. 1-24
    • Strayer, W.T.1    Lapsely, D.2    Walsh, R.3    Livadas, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.