參考文獻
[1]Barford P., Yegneswaran V., “An Inside Look at Botnets.” In Malware Detection. Springer US, 2007, pp. 171-191
[2]Tyagi A.K., Aghila _G.,“A Wide Scale Survey on Botnet”, International Journal of Computer Applications(IJCA 2011), Volume 34- No.9, pp. 9-22, Novmber 2011, New York, USA.
[3]Secure Business Intelligence “Ad networks become shadowy JavaScript-flavoured DoS bots” http://www.scmagazine.com.au/News/352006,ad-networks-become-shadowy-javascript-flavoured-dos-bots.aspx
[4]Stinson E., Mitchell J.C., “Characterizing Bots’ Remote Control Behavior”, The Fourth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2007), pp. 89-108, September 14, 2007, Springer Berlin Heidelberg
[5]Chang S., Zhang L., Guan Y. and Daniels T.E. “A Framework for P2P Botnets.”In Communications and Mobile Computing, 2009(CMC'09), WRI International Conference on Volume.3, pp. 594-599, IEEE., January 6-8, 2009, Kunming, Yunan, China
[6]Wang P., Sparks S. and Zou C.C., “An Advanced Hybrid Peer-to-Peer Botnet.”, In First Workshop on Hot Topics in Understanding Botnets (HotBots’07), Usenix Addoc., April 10 ,2007, Cambridge, MA
[7]Zhang J., Xie Y., Yu F., Soukal D., and Lee W. “Intention and Origination: An Inside Look at Large-Scale Bot Queries.”, In Proceedings of the 20th Annual Network and Distributed System Security Symposium(NDSS 2013), February 24-27, 2013, San Diego, US.
[8]Kang H., Wang K., Soukal D., Behr F., and Zheng Z., “Large-scale Bot Detection for Search Engines.” In Proceedings of the 19th international conference on World wide web(WWW 2010), pp. 501-510. ACM, April 26-30 2010, Raleigh, North Carolina, USA.
[9]王欣怡,江清泉,“虛擬駭客攻防網路之規劃與建置”,銘傳大學資訊傳播工程學系碩士班,碩士學位論文,中華民國九十九年十月
[10]林敬皇,盧建同,李忠憲,楊竹星,“網路攻擊與防禦平台之研究與實作”,In 22nd Cryptology and Information Security Conference(CISC 2012), May 30-31, 2012, NCHU, Tai-chung, Taiwan.
[11]陳彥甫,“殭屍網路測試自動化環境架設與實驗執行”,中原大學資訊工程學系研究所,碩士學位論文,中華民國一百年七月。[12]Secunia Stay Secure,“Security Vulnerability Review 2013 Key figures and facts from a global IT-Security perspective”, http://secunia.com/?action=fetch&filename=Secunia_Vulnerability_Review_2013.pdf
[13]VMware VIX API 1.12, http://www.vmware.com/support/developer/vix-api/
[14]CODE PROJECT, “Automating VMWare Tasks in C# with the VIX API”http://www.codeproject.com/Articles/31961/Automating-VMWare-Tasks-in-C-with-the-VIX-API
[15]AutoIt, http://www.autoit腳本.com/site/autoit/
[16]Wireshark, http://www.wireshark.org
[17]Currports, http://www.nirsoft.net/utils/cports.html
[18]Process explorer, http://technet.microsoft.com/en-US/sysinternals/bb896653