|
[1]2016 Symantec Internet Security Threat Report, [Online]. Available: https://www.symantec.com/security-center/threat-report, 2016 [2]J. Goebel and T. Holz, Rishi: Identify bot contaminated hosts by IRC nickname evaluation, in first conference on First Workshop on Hot Topics in Understanding Botnets, 2007. [3]W. Salusky and R. Danford, Know your enemy: Fast-flux service networks, in The Honeynet Project, pp. 1-24, 2007. [4]M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis, A multifaceted approach to understanding the botnet phenomenon, in 6th ACM SIGCOMM on Internet measurement, pp. 41-52, 2006. [5]G. Gu, P. A. Porras, V. Yegneswaran, M. W. Fong, and W. Lee, Bothunter: Detecting malware infection through ids-driven dialog correlation, in USENIX Security Symposium, pp. 1-16, 2007. [6]G. Gu, J. Zhang, and W. Lee, BotSniffer: Detecting botnet command and control channels in network traffic, in 15th Annual Network and Distributed System Security Symposium, 2008. [7]G. Gu, R. Perdisci, J. Zhang, and W. Lee, BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection, in USENIX Security Symposium, pp. 139-154, 2008. [8]B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, Your botnet is my botnet: analysis of a botnet takeover, in 16th ACM conference on Computer and communications security, pp. 635-647, 2009. [9]S. Yadav, A. K. K. Reddy, and S. Ranjan, Detecting algorithmically generated domain-flux attacks with DNS traffic analysis, IEEE/ACM Transactions on Networking, vol. 20, pp. 1663-1677, 2012. [10]P. Porras, Inside risks reflections on Conficker, Communications of the ACM, vol. 52, pp. 23-24, 2009. [11]P. Porras, H. Saidi, and V. Yegneswaran, An analysis of conficker's logic and rendezvous points, Computer Science Laboratory, SRI International, Tech. Rep, 2009. [12]S. Shevchenko, Domain name generator for murofet. [Online]. Available: http://blog.threatexpert.com/2010/10/domain-name-generator-for-murofet.html, 2010. [13]J. R. Douceur, The Sybil attack, in Peer-to-peer Systems, pp. 251-260, 2002. [14]C. R. Davis, J. M. Fernandez, S. Neville, and J. McHugh, Sybil attacks as a mitigation strategy against the storm botnet, in 3rd International Conference on Malicious and Unwanted Software, pp. 32-40, 2008. [15]R. Bhattacharjee and A. Goel, Avoiding ballot stuffing in ebay-like reputation systems, in ACM SIGCOMM workshop on Economics of peer-to-peer systems, pp. 133-137, 2005. [16]P. Judge, Net vote rigging illustrates importance of Web services, [Online]. Available: http://www.zdnet.com/article/net-vote-rigging-illustrates-importance-of-web-services/, 2002 [17]M. Bianchini, M. Gori, and F. Scarselli, Inside pagerank, ACM Transactions on Internet Technology, vol. 5, pp. 92-128, 2005. [18]H. Choi, H. Lee, and H. Kim, BotGAD: detecting botnets by capturing group activities in network traffic, in Fourth International ICST Conference on communication System software and middleware, p. 2-9, 2009. [19]R. Villamarín-Salomón and J. C. Brustoloni, Bayesian bot detection based on DNS traffic similarity, in ACM symposium on Applied Computing, pp. 2035-2041, 2009. [20]S. Yadav, A. K. K. Reddy, A. L. Reddy, and S. Ranjan, Detecting algorithmically generated malicious domain names, in 10th ACM SIGCOMM conference on Internet measurement, pp. 48-61, 2012. [21]S. Yadav and A. L. Reddy, Winning with DNS failures: Strategies for faster botnet detection, Security and privacy in communication networks, pp. 446-459, 2012. [22]L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi, EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis, in 18th Annual Network and Distributed System Security Symposium, 2011. [23]M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou Ii, S. Abu-Nimeh, W. Lee, and D. Dagon, From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware, in USENIX Security Symposium, pp. 491-506, 2012. [24]P. V. Mockapetris, Domain names-concepts and facilities, 1987. [25]J. Lee, J. Kwon, H.-J. Shin, and H. Lee, Tracking multiple C&C botnets by analyzing DNS traffic, in 6th IEEE Workshop on Secure Network Protocols, pp. 67-72, 2010. [26]H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, Sybillimit: A near-optimal social network defense against Sybil attacks, in IEEE Symposium on Security and Privacy, pp. 3-17, 2008. [27]H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, Sybilguard: defending against Sybil attacks via social networks, IEEE/ACM Transactions on Networking, vol. 16, pp. 576-589, 2008. [28]V. Gruhn, M. Hülder, and V. Wolff-Marting, Utilizing Social Networking Platforms to Support Public Key Infrastructures, in SECRYPT, pp. 245-250, 2007. [29]G. Danezis and P. Mittal, SybilInfer: Detecting sybil Nodes using Social Networks, in 16th Annual Network and Distributed System Security Symposium, 2009. [30]W. Wei, F. Xu, C. C. Tan, and Q. Li, Sybildefender: Defend against Sybil attacks in large social networks, in IEEE INFOCOM, pp. 1951-1959, 2012. [31]L. Shi, S. Yu, W. Lou, and Y. T. Hou, Sybilshield: An agent-aided social network-based sybil defense among multiple communities, in IEEE INFOCOM, pp. 1034-1042, 2013. [32]A. Mohaisen, A. Yun, and Y. Kim, Measuring the mixing time of social graphs, in 10th ACM SIGCOMM on Internet measurement, pp. 383-389, 2010. [33]S. Wasserman and K. Faust, “Social network analysis: Methods and applications, Cambridge university press, vol. 8, 1994. [34]D. J. Watts and S. H. Strogatz. “Collective dynamics of ‘small-world’networks, nature, vol. 393(6684), pp. 440-442, 1998. [35]J. Scott, “Social network analysis: developments, advances, and prospects, Social network analysis and mining, vol. 1(1), pp. 21-26, 2011. [36]L. A. N. Amaral, A. Scala, M. Barthelemy, and H. E. Stanley, “Classes of small-world networks, National Academy of Sciences, vol. 97(21), pp. 11149-11152, 2000. [37]M. A. Figueiredo, and A. K. Jain, “Unsupervised learning of finite mixture models, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24(3), pp. 381-396, 2002. [38]R. Tibshirani, G. Walther, and T. Hastie, “Estimating the number of clusters in a data set via the gap statistic, Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 63(2), pp. 411-423, 2001. [39]D. Pelleg, and A. W. Moore, “X-means: Extending K-means with Efficient Estimation of the Number of Clusters, in ICML, pp. 727-734, 2000. [40]M. C. Nascimento, and L. Pitsoulis, “Community detection by modularity maximization using GRASP with path relinking, Computers & Operations Research, vol. 40(12), pp. 3121-3131, 2013. [41]Z. Li, “A Non-MCMC Procedure for Fitting Dirichlet Process Mixture Models, Doctoral dissertation, University of Saskatchewan, 2012. [42]M. E. Newman, “Fast algorithm for detecting community structure in networks, Physical review E, vol. 69(6), 2004. [43]A. Clauset, M. E. Newman, and C. Moore, “Finding community structure in very large networks, Physical review E, vol. 70(6), 2004. [44]B. Xiang, E. H. Chen, and T. Zhou, “Finding community structure based on subgraph similarity, Complex Networks, pp. 73-81, 2009. [45]M. C. Nascimento, and L. Pitsoulis, “Community detection by modularity maximization using GRASP with path relinking, Computers & Operations Research, vol. 40(12), pp. 3121-3131, 2013. [46]B. H. Good, Y. A. de Montjoye, and A. Clauset, “Performance of modularity maximization in practical contexts, Physical Review E, vol. 81(4), 2010. [47]M. Girvan, and M. E. Newman, “Community structure in social and biological networks, National Academy of Sciences, vol. 99(12), pp. 7821-7826, 2002. [48]T. S. Wang, H. T. Lin, and P. Wang, “Weighted-spectral clustering algorithm for detecting community structures in complex networks, Artificial Intelligence Review, 2016. doi:10.1007/s10462-016-9488-4 [49]T. S. Wang, H. T. Lin, W. T. Cheng, and C. Y. Chen, “DBod: clustering and detecting DGA-based botnets using DNS traffic analysis, Computers & Security, vol. 64, pp. 1-15, 2017. [50]M. S. Granovetter, The strength of weak ties, American journal of sociology, pp. 1360-1380, 1973. [51]P. De Meo, E. Ferrara, G. Fiumara, and A. Provetti, On Facebook, most ties are weak, Communications of the ACM, vol. 57, pp. 78-84, 2014. [52]E. Ferrara, P. De Meo, G. Fiumara, and A. Provetti, The role of strong and weak ties in Facebook: a community structure perspective, Preprint at http://arXiv. org/abs/1203.0535. [53]V. Pareto, “Cours d'économie politique: Librairie Droz, 1964. [54]D. Fay, H. Haddadi, A. Thomason, A. W. Moore, R. Mortier, A. Jamakovic, and M. Rio, “Weighted spectral distribution for internet topology analysis: theory and applications, IEEE/ACM Transactions on Networking, vol. 18(1), pp. 164-176, 2010. [55]L. Jure, and K. Andrej, SNAP Datasets: Stanford Large Network Dataset Collection. http://snap.stanford.edu/data/, 2014. [56]B. Mohar, and Y. Alavi, “The Laplacian spectrum of graphs, Graph theory, combinatorics, and applications, vol. 2, pp. 871-898, 1991. [57]F. R. Chung, “Spectral graph theory, American Mathematical Soc., vol. 92, 1997. [58]K. Wehmuth, A. T. A. Gomes, A. Ziviani, and A. P. C. Da Silva, “On the joint dynamics of network diameter and spectral gap under node removal, in Latin-American Workshop on Dynamic Networks, 2010. [59]K. Wehmuth, and A. Ziviani, “Distributed location of the critical nodes to network robustness based on spectral analysis, in IEEE 7th Latin American Network Operations and Management Symposium, 2011. [60]B. M. Waxman, “Routing of multipoint connections, IEEE Journal on Selected Areas in Communications, vol. 6(9), pp. 1617-1622, 1988. [61]A. L. Barabási, and R. Albert, “Emergence of scaling in random networks, Science, vol. 286(5439), pp. 509-512, 1999. [62]W. W. Zachary, “An information flow model for conflict and fission in small groups, Journal of anthropological research, pp. 452-473, 1977. [63]D. Lusseau, “The emergent properties of a dolphin social network, Royal Society of London. Series B: Biological Sciences, vol. 270(2), pp.186-188, 2003. [64]D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, and S. M. Dawson, “The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations, Behavioral Ecology and Sociobiology, vol. 54(4), pp. 396-405, 2003. [65]D. E. Knuth, “The Stanford GraphBase: a platform for combinatorial computing, Reading: Addison-Wesley, vol. 37, 1993. [66]T. S. Evans, “Clique graphs and overlapping communities, Journal of Statistical Mechanics: Theory and Experiment, P12037, 2010. [67]J. Leskovec, and J. J. Mcauley, “Learning to discover social circles in ego networks, Advances in neural information processing systems, pp. 539-547, 2012. [68]J. Leskovec, D. Huttenlocher, and J. Kleinberg, “Predicting positive and negative links in online social networks, in 19th international conference on World wide web, pp. 641-650, 2010. [69]C. Biemann, “Chinese whispers: an efficient graph clustering algorithm and its application to natural language processing problems, in first workshop on graph based methods for natural language processing, pp. 73-80, 2006. [70]S. M. Van Dongen, “Graph clustering by flow simulation, Ph.D. Thesis, Dutch National Research Institute for Mathematics and Computer Science, University of Utrecht, Netherlands, 2001. [71]D. LaSalle, and G. Karypis, “Multi-threaded modularity based graph clustering using the multilevel paradigm, Journal of Parallel and Distributed Computing, vol. 76, pp. 66-80, 2015. [72]S. S. Silva, R. M. Silva, R. C. Pinto, and R. M. Salles, Botnets: A survey, Computer Networks, vol. 57(2), pp.378-403, 2013. [73]Y. Kugisaki, Y. Kasahara, Y. Hori, K. Sakurai, Bot detection based on traffic analysis, in International Conference on Intelligent Pervasive Computing, pp. 303–306, 2007. [74]P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, E. Kirda, Automatically generating models for botnet detection, M. Backes, P. Ning (Eds.), Computer Security – ESORICS, Lecture Notes in Computer Science, vol. 5789, pp. 232–249, 2009. [75]J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, J. Zhang, Botnet: classification, attacks, detection, tracing, and preventive measures, EURASIP journal on wireless communications and networking, pp. 1184-1187, 2009. [76]W. Lu, A. Ghorbani, “Botnets detection based on IRC-Community, in IEEE GLOBECOM, pp. 1–5, 2008. [77]E. Stalmans and B. Irwin, A framework for DNS based detection and mitigation of malware infections on a network, Information Security South Africa, pp. 1-8, 2011. [78]M. Feily, A. Shahrestani, and S. Ramadass, A survey of botnet and botnet detection, in Third International Conference on Emerging Security Information, Systems and Technologies, pp. 268-273, 2009. [79]Y. L. Zhou, Q. S. Li, Q. Miao, and K. Yim, DGA-Based Botnet Detection Using DNS Traffic, Journal of Internet Services and Information Security, vol. 3, pp. 116-123, 2013. [80]S. Schiavoni, F. Maggi, L. Cavallaro, and S. Zanero, Phoenix: DGA-based botnet tracking and intelligence, in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 192-211, 2014. [81]M. Mowbray and J. Hagen, Finding domain-generation algorithms by looking at length distribution, in IEEE International Symposium on Software Reliability Engineering Workshops, pp. 395-400, 2014. [82]R. Sharifnya and M. Abadi, DFBotKiller: domain-flux botnet detection based on the history of group activities and failures in DNS traffic, Digital Investigation, vol. 12, pp. 15-26, 2015. [83]The Spamhaus Project, [Online]. Available: http://www.spamhaus.org/ [84]Barracuda Reputation Block List, [Online]. Available: http://www.barracudacentral.org/ [85]SpamCop, [Online]. Available: https://www.spamcop.net/ [86]The Abusive Hosts Blocking List, [Online]. Available: http://www.ahbl.org/node [87]Open Malware – Community Malicious Code Research and Analysis, [Online]. Available: http://www.offensivecomputing.net/ [88]Virus Share, [Online]. Available: https://virusshare.com/ [89]Virus Total, [Online]. Available: https://www.virustotal.com/ [90]V. N. Bruce., DNS-Based DDoS: Diverse Options for Attackers. [Online]. Available: http://www.circleid.com/posts/20150415_dns_based_ddos_diverse_options_for_attackers/ [91]ScorecardResearch, [Online]. Available: https://www.scorecardresearch.com/ [92]McAfee secure, [Online]. Available: http://www.mcafee.com/ [93]R. Levien and A. Aiken, Attack-Resistant Trust Metrics for Public Key Certification, in 7th USENIX Security Symposium, 1998. [94]G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. Anderson, Sybil-resistant DHT routing, Computer Security, pp. 305-318, 2005. [95]N. Tran, J. Li, L. Subramanian, and S. S. M. Chow, Optimal sybil-resilient node admission control, in IEEE INFOCOM, pp. 3218-3226, 2011. [96]Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai, Uncovering social network sybils in the wild, ACM Transactions on Knowledge Discovery from Data, vol. 8, pp. 2, 2014. [97]D. Coppersmith, and S. Winograd, “Matrix multiplication via arithmetic progressions, in nineteenth annual ACM symposium on Theory of computing, pp.1-6, 1987.
|