[1]
Fang Binxing, Cui Xiang, Wang Wei. Survey of Betnots[J]. Journal of Computer Research and Debelopment, 2011, 48(8): 1315-1331 (in Chinese).
Google Scholar
[2]
Ollmann Gunter. Botnet communication topologies. Atlanta, GA: Damballa Inc, Technical Report: 2009-06-04, (2009).
Google Scholar
[3]
Wang Ping, Sparks Sherri, Zou Cliff C. An advanced hybrid peer-to-peer botnet. IEEE Transactions on Dependable and Secure Computing, VOL. 7, NO. 2, APRIL-JUNE (2010).
DOI: 10.1109/tdsc.2008.35
Google Scholar
[4]
Vogt Ryan, Aycock John, Michael J Jacobson Jr. Army of botnets/Proceedings of the 14th Annual Network and Distributed system Security Symposium. San Diego, USA, 2007: 111-123.
Google Scholar
[5]
Ian Clarke, Oskar Sandberg, Brandon Wiley and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, (2009).
DOI: 10.1007/3-540-44702-4_4
Google Scholar
[6]
Lance Spitzner. The Honeynet Project: Trapping the Hackers [J]. IEEE Security & privacy, 2003, 1(2): 15-23.
DOI: 10.1109/msecp.2003.1193207
Google Scholar
[7]
Baecher P,Koetter M, Holz T, et a1. The nepenthes platform:An efficient approach to collect malware[C]/Proceedings of Int Symp on Recent Advances in Intrusion Detection.Berlin: Springer,2006:165-184.
DOI: 10.1007/11856214_9
Google Scholar
[8]
Zhuge Jianwei, Han Xinhui, Zhou Yonglin et al. HoneyBow: an automated malware collection tool based on the high-interaction honeypot principle [J]. Journal on Communications, 2007, 28(12): 8-13 (in Chinese).
Google Scholar
[9]
B. Saha and A, Gairola. Botnet: An overview. CERT-In White PaperCIWP-2005-05, (2005).
Google Scholar
[10]
Wang Tianzuo, Wang Huaimin, Liu Bo and Shi Peichang. Some Critical Problems of Botnets. Chinese Journal of Computers, 2012, 35(6): 1192-1208 (in Chinese).
DOI: 10.3724/sp.j.1016.2012.01192
Google Scholar
[11]
M. Fabian, M. A. Terzis. My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging/Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007), (2007).
Google Scholar
[12]
Rajab Moheeb Abu, Zarfoss Jay, Monrose Fabian, Terzis Andreas. A multifaceted approach to understanding the botnet phenomenon/Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. Rio de Janeriro Brazil, 2006: 41-52.
DOI: 10.1145/1177080.1177086
Google Scholar
[13]
Holz Thorsten, Steiner Moritz, Dahl Fredric, Biersack Ernst, Freiling Felix. Measurements and mitigation of peer to peer based botnets: A case study on storm worm/Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats. San Francisco, USA, 2008: NO. 9.
Google Scholar
[14]
Stone-Gross Brett, Cova Marco, Cavallaro Lorenzo, Gilbert Bob, Szydlowski Martin, Kemmerer Richard, Kruegel Christopher, Vigna Giovanni. Your botnet is my botnet: Analysis of a botnet takeover/Proceedings of the 16th ACM conference on Computer and Communications Security. Chicago, USA, 2009: 635-647.
DOI: 10.1145/1653662.1653738
Google Scholar
[15]
Davis Carlton R, Ferandez Jose M, Neville Stephen, Mchugh Jonh. Sybil attacks as a mitigation strategy against the storm botnet/Proceedings of the 3rd Internal Conference on Malicious and Unwanted Software, Alexandria, USA, 2008: 32-40.
DOI: 10.1109/malware.2008.4690855
Google Scholar
[16]
Stock B, Engelberth M, Freiling F C, et al. Walowdac analysis of a peer-to-peer botnet/Proceedings of the 2009 European Conf on Computer Network Defense. Washington,DC: IEEE Computer Society, 2009: 13-20.
DOI: 10.1109/ec2nd.2009.10
Google Scholar