文档库 最新最全的文档下载
当前位置:文档库 › 一种关联网络和主机行为的延迟僵尸检测方法

一种关联网络和主机行为的延迟僵尸检测方法

一种关联网络和主机行为的延迟僵尸检测方法

作者:何毓锟, 李强, 嵇跃德, 郭东, HE Yu-Kun, LI Qiang, JI Yue-De, GUO Dong

作者单位:吉林大学计算机科学与技术学院 长春 130012;符号计算与知识工程教育部重点实验室(吉林大学) 长春130012

刊名:

计算机学报

英文刊名:Chinese Journal of Computers

年,卷(期):2014,37(1)

被引用次数:1次

参考文献(34条)

1.Ianelli N;Hackworth A Botnets as a vehicle for online crime

2.查看详情

3.查看详情

4.查看详情

5.查看详情

6.查看详情

7.查看详情

8.查看详情

9.查看详情

10.Park Y;Reeves D S Identification of bot commands by run time execution monitoring 2009

11.Stinson E;Mitchell J C Characterizing bots' remote control behavior 2007

12.Liu Lei;Chen Songqing;Yan Guanhua;Zhang Zhao BotTracer:Execution-based bot-like malware detection 2008

13.Coskun B;Dietrich S;Memon N Friends of an enemy:Identifying local members of peer-to-peer botnets using mutual contacts 2010

14.Nagaraja S;Mittal P;Hong Chi-Yao BotGrep:Finding P2P bots with structured graph analysis 2010

15.Collins M P;Reiter M K Hit-list worm detection and bot identification in large networks using protocol graphs 2007

16.Zeng Yuanyuan;Hu Xin;Shin K G Detection of botnets using combined host-and network-level information 2010

17.Shin Seungwon;Xu Zhaoyan;Gu Guofei EFFORT:Efficient and effective bot malware detection 2012

18.Rieck K;Trinius P;Willems C Automatic analysis of malware behavior using machine learning 2011(4)

19.Karbalaie F;Sami A;Ahmadi M Semantic malware detection by deploying graph mining 2012(1)

20.Kolbitsch C;Comparetti P M;Kruegel C Effective and efficient malware detection at the end host 2009

21.Al-Hammadi Y A A Behavioural correlation for malicious bot detection 2010

22.de Castro L R;Timmis J Articial Immune Systems:A New Computational Intelligence Paradigm 2002

23.Greensmith J;Aickelin U;Feyereisl J The DCA-SOMe comparison:A comparative study between two biologicallyinspired algorithms 2008(2)

24.Xu Zhaoyan;Chen Lingfeng;Gu Guofei;Kruegel C PeerPress:Utilizing enemies' P2P strength against them 2012

25.Tegeler F;Fu Xiaoming;Vigna G;Kruegel C BotFinder:Finding bots in network traffic without deep packet inspection 2012

26.Bilge L;Balzarotti D;Robertson W DISCLOSURE:Detecting botnet command and control servers through large-scale netflow analysis 2012

27.Francois J;Wang S;State R;Engel T Bottrack:Tracking botnets using netflow and pagerank 2011

28.Gu Guofei;Perdisci R;Zhang Junjie;Lee Wenke BotMiner:Clustering analysis of network traffic for protocol-and structure-independent botnet detection 2008

29.Gu Guofei;Zhang Junjie;Lee Wenke BotSniffer:Detecting botnet command and control channels in network traffic 2008

30.Gu Guofei Correlation-based botnet detection in enterprise networks 2008

31.Park Y H;Zhang Qinghua;Reeves D S AntiBot:Clustering common semantic patterns for bot detection 2010

32.Kwon T;Su Zhendong Modeling high-level behavior patterns for precise similarity analysis of software.University of California Davis,Davis,United States:Technical Reports CSE-2010-16 2010

33.Wang Xinyuan;Jiang Xuxian Artificial malware immunization based on dynamically assigned sense of self 2010

34.Neil Daswani,Michael Stoppelman,the Google Click Quality and Security Teams The anatomy of clickbot 2007

引用本文格式:何毓锟.李强.嵇跃德.郭东.HE Yu-Kun.LI Qiang.JI Yue-De.GUO Dong一种关联网络和主机行为的延迟僵尸检测方法[期刊论文]-计算机学报 2014(1)

相关文档