[1]
McCarty, B., Botnets: big and bigger. Security & Privacy, IEEE, 2003. 1(4): pp.87-90.
DOI: 10.1109/msecp.2003.1219079
Google Scholar
[2]
Li, Z., et al., Towards Situational Awareness of Large-scale Botnet Probing Events. Information Forensics and Security, IEEE Transactions on, 2010. PP(99): pp.1-1.
DOI: 10.1109/tifs.2010.2086445
Google Scholar
[3]
Schaffer, G.P., Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats. Security & Privacy, IEEE, 2006. 4(3): pp.52-58.
DOI: 10.1109/msp.2006.83
Google Scholar
[4]
Liu, S., Surviving Distributed Denial-of-Service Attacks. IT Professional, 2009. 11(5): pp.51-53.
Google Scholar
[5]
MyungKeun, Y., Using whitelisting to mitigate DDoS attacks on critical Internet sites. Communications Magazine, IEEE, 2010. 48(7): pp.110-115.
DOI: 10.1109/mcom.2010.5496886
Google Scholar
[6]
Ping, W., S. Sparks, and C.C. Zou, An Advanced Hybrid Peer-to-Peer Botnet. Dependable and Secure Computing, IEEE Transactions on, 2010. 7(2): pp.113-127.
DOI: 10.1109/tdsc.2008.35
Google Scholar
[7]
LI Rui, et al., Study on the Self-Similarity of P2P Traffic Behavior Based on Fractal Method. Journal of Beijing University of Posts and Telecommunications, 2010. 33(4): pp.35-38.
Google Scholar
[8]
YU Ge, et al., Rapid Detection Technique for P2P-Based Botnets. Journal of Northeastern University( Natural Science), 2010. 31(12): pp.1709-1712.
Google Scholar
[9]
Stone-Gross, B., et al., Analysis of a Botnet Takeover. Security & Privacy, IEEE, 2010. PP(99): pp.1-1.
Google Scholar
[10]
Baecher P, Koetter M, Holz T, et al. The Nepenthes platform: An efficient approach to collect malware [G]/LNCS 4219: Proc of the Int Symp on Recent Advances in Intrusion Detection (RAID 06 ). Berlin: Springer, 2006: 165-184.
DOI: 10.1007/11856214_9
Google Scholar
[11]
Cheng Jieren, Yin Jianping, Liu Yun, et al. Advances in the honeypot and honeynet technologies. Journal of Computer Research and Development, 2008, 45 (Suppl): 375-378 (in Chinese).
Google Scholar
[12]
Zhu Zhaosheng, Fu Zhi Judy, Lu Guohan, et al. Botnet research survey [C]/Proc of the 32nd Int Computer Software and Applications Conference. Washington, DC: IEEE Computer Society, 2008: 967-972.
DOI: 10.1109/compsac.2008.205
Google Scholar
[13]
Govil J, Govil J. Criminology of botnets and their detection and defense methods [C]/Proc of 2007 IEEE Int Conf on Electro/Information Technology ( EIT2007 ). Washington, DC: IEEE Computer Society, 2007: 215-220.
DOI: 10.1109/eit.2007.4374517
Google Scholar