|
[1]曾仲強, DNS舊技術新玩法-Fast-Flux. 資安人雜誌, 2009. 66: p. 74-78. [2]蕭淵隆, 陳彥錚, and 黃景煌, 採用RR-DNS 機制的網路服務可用性之研究, in 2003年台灣網際網路研討會. 2003. [3]Netman網中人. DNS協定. 2001; Available from: http://www.pcnet.idv.tw/pcnet/network/network_ip_dns.htm. [4]Consortium, I.S. Dimain information groper(DIG). Available from: https://www.isc.org/software/bind. [5]Zilong, W., et al., The Detection of IRC Botnet Based on Abnormal Behavior, in 2010 Second International Conference on MultiMedia and Information Technology. 2010. [6]Duan, J., et al., Descriptive Model of Peer-to-Peer Botnet Structures, in 2010 1nternational Conference on Educational and Information Technology (lCEIT 2010). 2010. [7]Lee, J.-S., et al., The Activity Analysis of Malicious HTTP-based Botnets using Degree of Periodic Repeatability, in 2008 International Conference on Security Technology. 2008. [8]Project, T.H. Know Your Enemy: Fast-Flux Service Networks. 2007; Available from: http://www.honeynet.org/papers/ff. [9]ATLAS. Global Fast Flux. 2010; Available from: http://atlas.arbor.net/summary/fastflux. [10]Holz, T., et al., Measuring and Detecting Fast-Flux Service Networks, in NDSS. 2008. [11]Scharrenberg, P., Analyzing Fast-Flux Service Networks. 2008, RWTH Aachen University. [12]Passerini, E., et al., FluXOR: detecting and monitoring fast-flux service networks. Lecture Notes in Computer Science, 2008. 5137: p. 186-206. [13]Alexa-Internet. The top 500 sites. 2010; Available from: www.alexa.com/topsites. [14] Nazario, J., & Holz, T. 2008, As the net churns: Fast-flux botnet observations, MALWARE 2008, 3rd International Conference on. [15] Zhou, C., et al., 2009, Collaborative Detection of Fast Flux Phishing Domains, Journal of Networks, pp.75.
|