|
[1]J. Nazario, and T. Holz, “As the net churns: Fast-flux botnet observations,” International Conference on Malicious and Unwanted Software, pp: 24-31, 2008. [2]R. Elz, and R. Bush, “Clarifications to the DNS Specification,” from http://www.ietf.org/rfc/rfc2181.txt,1997 [3]A. Baddeley, S. D. Sala, and T. Robbins, “Working Memory and Executive Control and Discussion,” Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences, 351(1346), pp. 1397-1404, 1996 [4]H. Binsalleeh, T. Ormerod, A. Boukhtouta, P. Sinha, A. Youssef, M. Debbabi, and L. Wang, “On the analysis of the Zeus botnet crimeware toolkit,” Paper presented at the Privacy Security and Trust (PST), pp: 31- 38, 2010. [5]J. Zhuge, T. Holz, X. Han, J. Guo, and W. Zou, “Characterizing the IRC-based botnet phenomenon,” Peking University & University of Mannheim Technical Report, 2007. [6]D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, “Inferring internet denial-of-service activity,” ACM Transactions on Computer Systems, 24(2), pp. 115-139, 2006 [7]E. Alomari, S. Manickam, B. B. Gupta, P. Singh, and M. Anbar, “Design, deployment and use of HTTP-based botnet (HBB) testbed,” International Conference on Advanced Communication Technology (ICACT), pp 1265- 1269, 2014 [8]Z. Junjie, R. Perdisci, L. Wenke, L. Xiapu, and U. Sarfraz, “Building a Scalable System for Stealthy P2P-Botnet Detection,” IEEE Transactions on Information Forensics and Security, 9(1), pp. 27-38, 2014 [9]A. Shahrestani, M. Feily, M. Masood, and B. Muniandy, “Visualization of invariant bot behavior for effective botnet traffic detection,” International Symposium on Telecommunication Technologies(ISTT), pp. 325-330, 2012 [10]G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, “Bothunter: Detecting malware infection through ids-driven dialog correlation,” USENIX Security Symposium, 2007 [11]G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting botnet command and control channels in network traffic,” Network and Distributed System Security Symposium, 2008 [12]G. Gu, R. Perdisci, J. Zhang, and W. Lee, “BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection,” USENIX Security Symposium, pp: 139-154, 2008 [13]J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious URLs,” ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1245-1254. , Paris 2009 [14]A.Blum, B. Wardman, T. Solorio, and G. Warner, “Lexical feature based phishing URL detection using online learning,” ACM workshop on Artificial intelligence and security, pp: 54-60, 2010 [15]N.S. Raghava, D. Sahgal, and S. Chandna, “Classification of Botnet Detection Based on Botnet Architechture,” , Communication Systems and Network Technologies (CSNT) , pp.569-572, 2012 [16]E. Stalmans, S.O. Hunter, and B. Irwin, “Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains,” Information Security for South Africa (ISSA), pp. 1- 7,2012 [17]L. Hsiaochung, C. Chiamei, and T. Juiyu, “Flow Based Botnet Detection,” International Conference on Innovative Computing, Information and Control (ICICIC), pp.1538-1541, 2009 [18]C. Chiamei, O. Yahui, and T. Yuchou, “ Web botnet detection based on flow information,” International Computer Symposium (ICS), pp.381 – 384, 2010 [19]D. Mahjoub, and H. El-Rewini, “ Adaptive Constraint-Based Multi-Objective Routing for Wireless Sensor Networks,” IEEE International Conference on Pervasive Services, pp.72-75, 2007 [20]D. Sanchez, M.J. Martin-Bautista, I. Blanco, and C. Torre, “Text Knowledge Mining: An Alternative to Text Data Mining,” IEEE International Conference on Data Mining Workshop, pp. 664- 672, 2008 [21]S. Shehata, F. Karray, and M.S. Kamel, “ An Efficient Concept-Based Mining Model for Enhancing Text Clustering,” IEEE Transactions on Knowledge and Data Engineering, 22( 10), pp. 1360-1371,2010 [22]M. Sukanya, and S, Biruntha, “ Techniques on text mining,” IEEE International Conference Advanced Communication Control and Computing Technologies, pp.269-271,2012 [23]Q. Yanliang, Z. Yang, and S. Min, “Text Mining for Bioinformatics: State of the Art Review,” IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp.398-401, 2009 [24]X. Huosong, F. Zhaoyan, and P. Liuyan, “Chinese Web Text Outlier Mining Based on Domain Knowledge,” WRI Global Congress on Intelligent Systems (GCIS), pp. 73- 77, 2010 [25]Y. Yujie, C. Yunpeng, L. Wenshu, L. Zhifeng, M. Zhenghui, Y. Xiaolu, and Y. Haibo, “An Ontology-based Approach for Text Mining of Stroke Electronic Medical Records,” IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 288-291, 2013 [26]S. L. Salzberg, “C4.5: Programs for Machine Learning,” by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993. Machine Learning, 16(3), pp. 235-240, 1994 [27]R. Kohavi, “A study of cross-validation and bootstrap for accuracy estimation and model selection,” Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI), 14(2), pp. 1137-1143, 1995 [28]DNS-BH Malware Domain Blocklist, 2013, from http://www.malwaredomains.com/ [29]Alexa the web information company, 2013, from http://www.alexa.com/ [30]T. Chinyang, and T. Yungyao, “Identification of Botnet domain name base on lexical feature,” Cryptology and Information Security Conference (CISC), 2012 [31]張士龍 “賽門鐵克2013年第 18 期網路安全威脅研究報告,” from http://icstwebstorage.blob.core.windows.net/attachfilearticles/%E8%B3%BD%E9%96%80%E9%90%B5%E5%85%8B%E5%85%A8%E7%90%83%E7%B6%B2%E8%B7%AF%E5%AE%89%E5%85%A8%E5%A8%81%E8%84%85%E7%A0%94%E7%A9%B6%E5%A0%B1%E5%91%8A%20%E7%AC%AC18%E6%9C%9F.pdf
|