|
[1]Feily, Maryam, Alireza Shahrestani, and Sureswaran Ramadass. A survey of botnet and botnet detection. 2009 Third International Conference on Emerging Security Information, Systems and Technologies. IEEE, 2009. [2]Wang, Wei, et al. A novel approach to detect IRC-based botnets. Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC'09. International Conference on. Vol. 1. IEEE, 2009. [3]Dittrich, David, and Sven Dietrich. P2P as botnet command and control: a deeper insight. Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on. IEEE, 2008. [4]Feily, Maryam, Alireza Shahrestani, and Sureswaran Ramadass. A survey of botnet and botnet detection. 2009 Third International Conference on Emerging Security Information, Systems and Technologies. IEEE, 2009. [5]Zou, Cliff Changchun, and Ryan Cunningham. Honeypot-aware advanced botnet construction and maintenance. International Conference on Dependable Systems and Networks (DSN'06). IEEE, 2006. [6]C. Zou and R. Cunningham, Honeypot-aware advanced botnet construction and maintenance, in Proceedings of International Conference on Dependable Systems and Networks (DSN), June 2006. [7]W.Timothy Strayer , David Lapsely , Robert Walsh ,Carl Livadas Botnet Detection Based on Network Behavior Volume 36 of the series Advances in Information Security 1-24 [8]Binkley, James R., and Suresh Singh. An Algorithm for Anomaly-based Botnet Detection. SRUTI 6 (2006): 7-7. [9]H. Choi, H. Lee, H. Lee, and H. Kim, “Botnet Detection by Monitoring Group Activities in DNS Traffic, in Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 2007, pp.715-720. [10]M. M. Masud, T. Al-khateeb, L. Khan, B. Thuraisingham, K. W.Hamlen, “ Flow-based identification of botnet traffic by mining multiple log file, in Proc. International Conference on Distributed Frameworks & Applications (DFMA), Penang, Malaysia, 2008 [11]G. Gu, R. Perdisci, J. Zhang, and W. Lee, “Botminer: Clustering analysis of network traffic for protocol- and structure independent botnet detection, in Proc. 17th USENIX Security Symposium, 2008 [12]Potter, M.C., Wyble, B., Hagmann, C.E., & McCourt, E.S. (2014). Detecting meaning in RSVP at 13 ms per picture. Attention, Perception, and Psychophysics.Triebel, Rudolph, et al. Intelligent Transportation System. [13] Elasticsearch, https://www.elastic.co/products/elasticsearch. [14]Netflow version 5, http://www.cisco.com/c/en/us/td/docs/net_mgmt/netflow_collection_engine/3-6/user/guide/format.html. [15]Logstash, https://www.elastic.co/products/logstash.
|