|
[1]E. Stalmans, S.O. Hunter, and B. Irwin, “Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains”, Information Security for South Africa (ISSA), pp. 1- 7,2012 [2] G. Gu, P. Porras, V. Yegneswaran, M. Fong and W. Lee, “Bothunter: Detecting malware infection through ids-driven dialog correlation”. USENIX Security Symposium, 2007 [3]G. Gu, J. Zhang and W. Lee, “BotSniffer: Detecting botnet command and control channels in network traffic”, Network and Distributed System Security Symposium, 2008 [4]C. ChiaMei, O. YaHui, and T. YuChou, ”Web botnet detection based on flow information” International Computer Symposium (ICS), pp.381 – 384, 2010 [5]D. Mahjoub and H. ElRewini, ”Adaptive Constraint-Based Multi-Objective Routing for Wireless Sensor Networks”, IEEE International Conference on Pervasive Services, pp.72-75, 2007 [6]S. L. Salzberg, “C4.5: Programs for Machine Learning” by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993. Machine Learning, vol. 16, no. 3, pp. 235-240, 1994 [7]R. Kohavi, “A study of cross-validation and bootstrap for accuracy estimation and model selection”. International Joint Conference on Artificial Intelligence (IJCAI), vol.14, no. 2, pp. 1137-1143, 1995 [8]S. Yadav, A. K. K. Reddy, A. L. N. Reddy, and S. Ranjan, “Detecting algorithmically generated domain-flux attacks with DNS traffic analysis”, IEEE/ACM Trans. Netw., vol. 20, no. 5, pp. 1663–1677, Oct. 2012. [9]M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon, “From throw-away traffic to bots: detecting the rise of dga-based malware” in Proceedings of the 21st USENIX conference on Security symposium, ser. Security’12. Berkeley, CA, USA: USENIX Association, 2012, pp. 24–24 [10]http://s3-us-west-1.amazonaws.com/umbrella-static/index.html [11]http://data.netlab.360.com/dga/ [12]https://abuse.ch/ [13] M. Dooley, T. Rooney, "DNS Security Management", IEEE press, 2017 [14] Twitter api still attracts hackers. http://blog.unmaskparasites.com/2009/12/09/ twitter-api-still-attracts-hackers/. [15] B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. “Your botnet is my botnet: Analysis of a botnet takeover”, ACM Conference on Computer and Communications Security (CCS), 2009. [16] D. Andriesse, C. Rossow, B. Stone-Gross, D. Plohmann, and H. Bos, "Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus", 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" [17] Ian H.Witten, Eibe Frank, Mark A. Hall, "Data Mining Practical Machine Learning Tools and Techniques", 3rd Edition, 2011 [18] Schiavoni S., Maggi F., Cavallaro L., Zanero S. “Phoenix: DGA-Based Botnet Tracking and Intelligence.” Dietrich S. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2014.
|