메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Challenges in experimenting with botnet detection systems

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 85084161642     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (59)

References (50)
  • 2
    • 34250017239 scopus 로고    scopus 로고
    • A face is exposed for AOL searcher no. 4417749
    • Aug
    • M. Barbaro and T. Zeller. A face is exposed for AOL searcher no. 4417749. The New York Times, Aug. 2006. http://www.nytimes.com/2006/08/09/technology/09aol.html.
    • (2006) The New York Times
    • Barbaro, M.1    Zeller, T.2
  • 4
    • 85080572052 scopus 로고    scopus 로고
    • CAIDA. http://www.caida.org/.
    • CAIDA
  • 8
    • 85080526776 scopus 로고    scopus 로고
    • Cyber-TA. http://cyber-ta.org/.
  • 13
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • July
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In 17th USENIX Security Symposium, July 2008.
    • (2008) 17th USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 17
    • 85080525602 scopus 로고    scopus 로고
    • Honey@home. http://www.honeyathome.org/.
    • Honey@Home
  • 22
    • 78651469705 scopus 로고    scopus 로고
    • PhD thesis, Georgia Institute of Technology, Atlanta, Georgia, May
    • C. P. Lee. Framework for Botnet Emulation and Analysis. PhD thesis, Georgia Institute of Technology, Atlanta, Georgia, May 2009.
    • (2009) Framework for Botnet Emulation and Analysis
    • Lee, C.P.1
  • 24
    • 78751649445 scopus 로고    scopus 로고
    • Clustering botnet communication traffic based on n-gram feature selection
    • Mar
    • W. Lu, G. Rammidi, and A. A. Ghorbani. Clustering botnet communication traffic based on n-gram feature selection. Computer Communications, 34(3):502–514, Mar. 2011.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 502-514
    • Lu, W.1    Rammidi, G.2    Ghorbani, A.A.3
  • 37
    • 84903516313 scopus 로고    scopus 로고
    • Shadowserver. http://shadowserver.org/.
    • Shadowserver
  • 38
    • 33845215790 scopus 로고    scopus 로고
    • Using PlanetLab for network research: Myths, realities, and best practices
    • Jan
    • N. Spring, L. Peterson, A. Bavier, and V. Pai. Using PlanetLab for network research: myths, realities, and best practices. SIGOPS Operating Systems Review, 40(1):17–24, Jan. 2006.
    • (2006) SIGOPS Operating Systems Review , vol.40 , Issue.1 , pp. 17-24
    • Spring, N.1    Peterson, L.2    Bavier, A.3    Pai, V.4
  • 42
    • 67650145176 scopus 로고    scopus 로고
    • Swing: Realistic and responsive network traffic generation
    • June
    • K. V. Vishwanath and A. Vahdat. Swing: Realistic and responsive network traffic generation. IEEE/ACM Transactions on Networking, 17(3):712–725, June 2009.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.3 , pp. 712-725
    • Vishwanath, K.V.1    Vahdat, A.2
  • 43
    • 85080506984 scopus 로고    scopus 로고
    • VX Heavens. http://vx.netlux.org/.
    • VX Heavens


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.