一种关联网络和主机行为的延迟僵尸检测方法
作者:何毓锟, 李强, 嵇跃德, 郭东, HE Yu-Kun, LI Qiang, JI Yue-De, GUO Dong
作者单位:吉林大学计算机科学与技术学院 长春 130012;符号计算与知识工程教育部重点实验室(吉林大学) 长春130012
刊名:
计算机学报
英文刊名:Chinese Journal of Computers
年,卷(期):2014,37(1)
被引用次数:1次
参考文献(34条)
1.Ianelli N;Hackworth A Botnets as a vehicle for online crime
2.查看详情
3.查看详情
4.查看详情
5.查看详情
6.查看详情
7.查看详情
8.查看详情
9.查看详情
10.Park Y;Reeves D S Identification of bot commands by run time execution monitoring 2009
11.Stinson E;Mitchell J C Characterizing bots' remote control behavior 2007
12.Liu Lei;Chen Songqing;Yan Guanhua;Zhang Zhao BotTracer:Execution-based bot-like malware detection 2008
13.Coskun B;Dietrich S;Memon N Friends of an enemy:Identifying local members of peer-to-peer botnets using mutual contacts 2010
14.Nagaraja S;Mittal P;Hong Chi-Yao BotGrep:Finding P2P bots with structured graph analysis 2010
15.Collins M P;Reiter M K Hit-list worm detection and bot identification in large networks using protocol graphs 2007
16.Zeng Yuanyuan;Hu Xin;Shin K G Detection of botnets using combined host-and network-level information 2010
17.Shin Seungwon;Xu Zhaoyan;Gu Guofei EFFORT:Efficient and effective bot malware detection 2012
18.Rieck K;Trinius P;Willems C Automatic analysis of malware behavior using machine learning 2011(4)
19.Karbalaie F;Sami A;Ahmadi M Semantic malware detection by deploying graph mining 2012(1)
20.Kolbitsch C;Comparetti P M;Kruegel C Effective and efficient malware detection at the end host 2009
21.Al-Hammadi Y A A Behavioural correlation for malicious bot detection 2010
22.de Castro L R;Timmis J Articial Immune Systems:A New Computational Intelligence Paradigm 2002
23.Greensmith J;Aickelin U;Feyereisl J The DCA-SOMe comparison:A comparative study between two biologicallyinspired algorithms 2008(2)
24.Xu Zhaoyan;Chen Lingfeng;Gu Guofei;Kruegel C PeerPress:Utilizing enemies' P2P strength against them 2012
25.Tegeler F;Fu Xiaoming;Vigna G;Kruegel C BotFinder:Finding bots in network traffic without deep packet inspection 2012
26.Bilge L;Balzarotti D;Robertson W DISCLOSURE:Detecting botnet command and control servers through large-scale netflow analysis 2012
27.Francois J;Wang S;State R;Engel T Bottrack:Tracking botnets using netflow and pagerank 2011
28.Gu Guofei;Perdisci R;Zhang Junjie;Lee Wenke BotMiner:Clustering analysis of network traffic for protocol-and structure-independent botnet detection 2008
29.Gu Guofei;Zhang Junjie;Lee Wenke BotSniffer:Detecting botnet command and control channels in network traffic 2008
30.Gu Guofei Correlation-based botnet detection in enterprise networks 2008
31.Park Y H;Zhang Qinghua;Reeves D S AntiBot:Clustering common semantic patterns for bot detection 2010
32.Kwon T;Su Zhendong Modeling high-level behavior patterns for precise similarity analysis of software.University of California Davis,Davis,United States:Technical Reports CSE-2010-16 2010
33.Wang Xinyuan;Jiang Xuxian Artificial malware immunization based on dynamically assigned sense of self 2010
34.Neil Daswani,Michael Stoppelman,the Google Click Quality and Security Teams The anatomy of clickbot 2007
引用本文格式:何毓锟.李强.嵇跃德.郭东.HE Yu-Kun.LI Qiang.JI Yue-De.GUO Dong一种关联网络和主机行为的延迟僵尸检测方法[期刊论文]-计算机学报 2014(1)