[1]杜跃进,崔翔.僵尸网络及其启发 [J].中国数据通信,2005,7(5):9-13.
[2]诸葛建伟,韩心慧,周勇林,等.HoneyBow:一个基于高交互式蜜罐技术的恶意代码自动捕获器 [J].通信学报,2007,28(12):8-13.
[3]Malan D J.Rapid Detection of Botnets Through Collaborative Networks of Peers[D].Cambridge,Massachusetts:Harvard University,2007.
[4]AlHammadi Y,Aickelin U.Detecting Botnets Through Log Correlation [C].Tuebingen,Germany:Proceedings of the IEEE/IST Workshop on Monitoring,Attack Detection and Mitigation,2006:97-100.
[5]Strayer W T,Walsh.Detecting Botnets with Tight Command and Control[C].Tampa,FL:Proceedings of the 31st IEEEConference on Local Computer Networks,2006:195-202.
[6]Goebel J.Rishi:Identify bot Contaminated Hosts by IRC Nickname Evaluation [C].Cambridge,MA:Proceedings of the HotBots07,First Workshop on Hot Topics in Understanding Botnets,2007.
[7]Karasaridis A,Rexroad B.Widescale Botnet Detection and Characterization [C].Cambridge,MA:Proceedings of the HotBots07,First Workshop on Hot Topics in Understanding Botnets,2007.
[8]Gu G,Porras P,Yegneswaran V.BotHunter:Detecting Malware Infection Through Idsdriven Dialog Correlation [C].Boston,Massachusetts:Proceedings of the 16th USENIX Security Symposium(Security07),2007:167-182.
[9]Gu G,Zhang J,Lee W.BotSniffer:Detecting Botnet Command and Control Channels in Network Traffic [C].San Diego,CA:Proceedings of the 15th Annual Network and Distributed System Security Symposium(NDSS08),2008:269-286.
[10]Gu G,Perdisct R,Zhang J,et al.BotMiner:Clustering Analysis of Network Traffic for Protocol and Structureindependent Botnet Detection [C].San Jose,CA:Proceedings of the 17th USENIX Security Symposium (Security08),2008:139-154.
[11]Ramachandran A,Feamster N,Vempala S.Filtering Spam with Behavioral Blacklisting [C].In Proc.ACM Conference on Computer and Communications Security (CCS07),2007.
[12]Zhuge J,Holz T,Han X,et al.Characterizing the Ircbased Botnet Phenomenon [M].Beijing:Peking University & University of Mannheim Technical Report,2007.
[13]Jung J,Paxson V,Berger A W,et al.Fast Portscan Detection Using Sequential Hypothesis Testing [C].Oakland,CA:In IEEE Symposium on Security and Privacy,2004.
[14]Wald A.Sequential Tests of Statistical Hypotheses [J].The Annals of Mathematical Statistics,1945,16(2):117-186.
[15]Barford P,Yegneswaran V.An Inside Look at Botnets [M].Springer Verlag:Special Workshop on Malware Detection,Advances in Information Security,2006. |