共 20 条
[1]
Du Y.-J., Cui X., Botnets and its enlightment, China Data Communication, 7, 5, pp. 9-13, (2005)
[2]
Oikarinen J., Reed D., Internet relay chat protocol, (1993)
[3]
Zhuge J.-W., Han X.-H., Zhou Y.-L., Et al., HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle, Journal of Communications, 28, 12, pp. 8-13, (2007)
[4]
Malan D.J., Rapid detection of botnets through collaborative networks of peers, (2007)
[5]
Al-Hammadi Y., Aickelin U., Detecting botnets through log correlation, Proceedings of the IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation, pp. 97-100, (2006)
[6]
Binkley J.R., Singh S., An algorithm for anomaly-based bot-net detection, Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, pp. 43-48, (2006)
[7]
Strayer W.T., Walsh R., Et al., Detecting botnets with tight command and control, Proceedings of the 31st IEEE Conference on Local Computer Networks, pp. 195-202, (2006)
[8]
Goebel J., Et al., Rishi: Identify bot contaminated hosts by IRC nickname evaluation, Proceedings of the HotBots'07, (2007)
[9]
Karasaridis A., Rexroad B., Et al., Wide-scale botnet detection and characterization, Proceedings of the HotBots'07, First Workshop on Hot Topics in Understanding Botnets, (2007)
[10]
Gu G., Porras P., Yegneswaran V., Et al., BotHunter: Detecting malware infection through ids-driven dialog correlation, Proceedings of the 16th USENIX Security Symposium (Security'07), pp. 167-182, (2007)