|
(1)Alomari E., et al., “Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art”, International Journal of Computer Applications, Vol. 49, No. 7, July 2012. (2)Alomari, E., et al., “Design, deployment and use of HTTP-based botnet (HBB) testbed”, Advanced Communication Technology (ICACT), 2014 16th International Conference on, pp. 1265-1269, February. 2014. (3)Akbar, S., et al., “Intrusion Detection System Methodologies Based on Data Analysis”, International Journal of Computer Applications (IJCA), Vol. 5, No. 2, pp. 10-20, August 2010. (4)Denatious, D. K., John, A., “Survey on Data Mining Techniques to Enhance Intrusion Detection”, Computer Communication and Informatics (ICCCI), pp. 1-5, January 2012. (5)Ficco, M., et al., “Intrusion Detection in Cloud Computing”, P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 276-283, October 2013. (6)Han, F., et al., “Garlic: A Distributed Botnets Suppression System”, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pp. 634-639, June 2012. (7)Hung, P., Tan, L., “Design and Implementation of Partially Decentralized P2P Botnet Control”, Journal of Computer Applications, Vol. 29, No. 9, pp. 2446-2449, September 2009. (8)Hussein, S. M., et al., “Evaluation Effectiveness of Hybrid IDS Using Snort with Naive Bayes to Detect Attacks”, Digital Information and Communication Technology and it''s Applications (DICTAP), 2012 Second International Conference on, pp. 256-260, May 2012. (9)Idrees, F., et al., “Framework for Distributed and Self-healing Hybrid Intrusion Detection and Prevention System”, ICT Convergence (ICTC), pp. 277-282, October 2013. (10)Jang D., et al., “Analysis of HTTP2P botnet: case study waledac”, Communications (MICC), 2009 IEEE 9th Malaysia International Conference on, pp. 15-17, December 2009. (11)Jadidi, Z., et al., “Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm”, Distributed Computing Systems Workshops (ICDCSW), pp. 76-81, July 2013. (12)Kheir, N., “Behavioral Classification and Detection of Malware through HTTP User Agent Anomalies”, Journal of Information Security and Applications, Vol. 18, No. 1, pp. 2-13, July 2013. (13)Khazaee, S., Rad, M. S., “Using Fuzzy C-means Algorithm for Improving Intrusion Detection Performance”, Fuzzy Systems (IFSC), 2013 13th Iranian Conference, pp. 1-4, August 2013. (14)Lu, T. T., et al., “An Advanced Hybrid P2p Botnet 2.0”, World Academy of Science, Engineering and Technology, Vol. 81, pp. 595-597, June 2011. (15)Modi, C. N., et al., “Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing”, 2nd International Conference on Communication, Computing & Security (ICCCS-2012), Vol. 6, pp. 905-912, November 2012. (16)Modi, C., et al., “A Survey of Intrusion Detection Techniques in Cloud”, Journal of Network and Computer Applications, Vol. 36, No 1, pp. 42-57, January 2013a. (17)Modi, C. N. and Patel, D., “A Novel Hybrid-network Intrusion Detection System (H-NIDS) in Cloud Computing”, IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 23-30, April 2013b. (18)Muda, Z., et al., “Intrusion Detection based on K-Means Clustering and Naive Bayes Classification”, In Proceedings of 7th International Conference on IT in Asia (CITA), pp. 1-6, July 2011. (19)Oikarinen, J., Reed, D., “Internet Relay Chat Protocol”, Request for Comments (RFC) 1459, IETF, May 1993. (20)Park, Y., Reeves, D. S., “Identification of Bot Commands by Run-Time Execution Monitoring”, Computer Security Applications Conference, 2009. ACSAC ''09. Annual, pp. 321-330, December 2009. (21)Schille,C.r, et al., Botnets: The Killer Web App, 1 edition, Syngress, January 2003. (22)Tsai, M., et al., “C&C tracer: Botnet command and control behavior tracing”, Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pp.1859-1864, October 2011. (23)Uddin, M., et al., “Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents”, International Journal of Network Security & Its Applications (IJNSA), Vol. 2, No. 4, pp. 129-141, October 2010. (24)Vanathi, R., Gunasekaran, S., “Comparison of Network Intrusion Detection Systems in Cloud Computing Environment”, Computer Communication and Informatics (ICCCI), pp. 1-6, January 2012. (25)Wang, P., et al., “Honeypot Detection in Advanced Botnet Attacks”, International Journal of Information and Computer Security, pp. 30 – 51, March 2010a. (26)Wang, P., et al., “An Advanced Hybrid Peer-to-Peer Botnet”, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 2, pp. 113-127, April-June 2010b. (27)Xiao-nan, L., et al., “Peer-to-Peer Botnets: Analysis and Defense”, Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, pp. 27-29, May 2011. (28)Zhigang, J., et al., “P2P Botnets Detection based on User Behavior Sociality and Traffic Entropy Function”, Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp. 1953-1955, April 2012
|