[1]
S. Kandula, D. Katabi, M. Jacob, and A. Berger, Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds, in 2nd Symposium on Networked Systems Design and Implementation (NSDI), May (2005).
Google Scholar
[2]
Information on http: /www. cnn. com/2006/TECH/internet/01/31/furst.
Google Scholar
[3]
F. Freiling, T. Holz, and G. Wicherski, Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks, CS Dept. of RWTH Aachen University, Tech. Rep. AIB-2005-07, April (2005).
DOI: 10.1007/11555827_19
Google Scholar
[4]
D. Dagon, C. Zou, and W. Lee, Modeling botnet propagation using time zones, in Proceedings of 13th Annual Network and Distributed System Security Symposium (NDSS), Feburary 2006, pp.235-249.
Google Scholar
[5]
A. Ramachandran, N. Feamster, and D. Dagon, Revealing botnet membership using dnsbl counter-intelligence, in USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06), June (2006).
DOI: 10.1007/978-0-387-68768-1_7
Google Scholar
[6]
E. Cooke, F. Jahanian, and D. McPherson, The zombie roundup: Understanding, detecting, and disrupting botnets, in Proceedings of SRUTI: Steps to Reducing Unwanted Traffic on the Internet, July (2005).
Google Scholar
[7]
J. R. Binkley and S. Singh, An algorithm for anomaly-based botnet detection, in USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06), June (2006).
Google Scholar
[8]
Information on http: /en. wikipedia. org/wiki/Servent.
Google Scholar
[9]
Steven C, Gustufson, Robust estimation of mahalanobis distance in hyper-spectral images [J], Air-Force Institute of Technology, (2006).
Google Scholar
[10]
Matthias R H, Holz H T. Towards next-generation botnets[C], 2008 European Conference on Computer Network Defense, Dublin, 2008: 33-40.
DOI: 10.1109/ec2nd.2008.11
Google Scholar
[11]
B. McCarty, Botnets: Big and bigger, IEEE Security & Privacy Magazine, Vol. 1, No. 4, July (2003).
Google Scholar
[12]
C. Zou and R. Cunningham, Honeypot-aware advanced botnet construction and maintenance, in Proceedings of International Conference on Dependable Systems and Networks (DSN), June (2006).
DOI: 10.1109/dsn.2006.38
Google Scholar
[13]
T. Strayer. (2006) Detecting botnets with tight command and control. ARO/DARPA/DHS Special Workshop on Botnet.
Google Scholar
[14]
Y. Chen, (2006) IRC-based botnet detection on high-speed routers, ARO/DARPA/DHS Special Workshop on Botnet.
Google Scholar
[15]
P. Barford and V. Yegneswaran, An inside Look at Botnets, To appear in Series: Advances in Information Security. Springer, (2006).
DOI: 10.1007/978-0-387-44599-1_8
Google Scholar
[16]
R. Vogt, J. Aycock, and M. Jacobson, Army of botnets, " in Proceedings of 14th Annual Network and Distributed System Security Symposium (NDSS)", month = "Feburary", year="2007.
Google Scholar