[1] |
CUI X , FANG B X ,et al. Botnet triple-channel model:towards resilient and efficient bidirectional communication botnets[M]// Security and Privacy in Communication Networks. Springer International Publishing, 2013.
|
[2] |
SHAHID K ,et al. A taxonomy of botnet behavior,detection,and defense[J]. Communications Surveys &Tutorials,IEEE, 2015,16(2): 898-924.
|
[3] |
HEILMAN E , KENDLER A , ZOHAR A ,et al. Eclipse attacks on Bitcoin’s peer-to-peer network[C]// 24th USENIX Security Symposium (USENIX Security 15). 2015: 129-144.
|
[4] |
CANALI D , BALZAROTTI D . Behind the scenes of online attacks:an analysis of exploitation behaviors on the Web[C]// 20th Annual Network&Distributed System Security Symposium(NDSS 2013). 2013.
|
[5] |
Netcraft. Web server survey[EB/OL]. .
|
[6] |
Symantec. 2015 Internet security threat report[EB/OL]. .
|
[7] |
F-Secure. Backdoor:Osx/tsunami[EB/OL]. .
|
[8] |
New bot malware (BoSSaBoTv2) attacking Web servers discovered[EB/OL]. .
|
[9] |
WANG P , SPARKS S , ZOU C C . An advanced hybrid peer-to-peer botnet[J]. IEEE Transactions on Dependable and Secure Computing, 2010,7(2): 113-127.
|
[10] |
STARNBERGER G , KRUEGEL C , KIRDA E . Overbot:a botnet protocol based on Kademlia[C]// The 4th International Conference on Security and Privacy in Communication Networks. ACM, 2008.
|
[11] |
HUND R , HAMANN M , HOLZ T . Towards next-generation botnets[C]// European Conference on Computer Network Defense. IEEE, 2008: 33-40.
|
[12] |
DOUCEUR J R . The sybil attackpeer-to-peer systems[M]// Springer Berlin Heidelberg, 2002: 251-260.
|
[13] |
SINGH K , SRIVASTAVA A , GIFFIN J ,et al. Evaluating email’s feasibility for botnet command and control[C]// IEEE International Conference on Dependable Systems and Networks With FTCS and DCC,IEEE, 2008: 376-385.
|
[14] |
XU K , BUTLER P , SAHA S ,et al. DNS for massive-scale command and control[J]. IEEE Transactions on Dependable and Secure Computing, 2013,10(3): 143-153.
|
[15] |
CUI X , FNAG B X ,et al. Andbot:towards advanced mobile botnets[C]// Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats. USENIX Association, 2011: 11-11.
|
[16] |
LEE S , KIM J . Fluxing botnet command and control channels with URL shortening services[J]. Computer Communications, 2013,36(3): 320-332.
|
[17] |
SANATINIA A , NOUBIR G . OnionBots:subverting privacy infrastructure for cyber attacks[C]// Dependable Systems and Networks (DSN), 2015: 69-80.
|
[18] |
LI J , EHRENKRANZ T , KUENNING G ,et al. Simulation and analysis on the resiliency and efficiency of malnets[C]// Principles of Advanced and Distributed Simulation. IEEE, 2005: 262-269.
|
[19] |
WANG D Y , SAVAGE S , VOELKER G M . Juice:a longitudinal study of an SEO botnet[C]// The NDSS Symposium. 2013.
|
[20] |
STONE-GROSS B , COVA M , CAVALLARO L ,et al. Your botnet is my botnet:analysis of a botnet takeover[C]// The 16th ACM Conference on Computer and Communications Security. ACM, 2009: 635-647.
|
[21] |
BIRYUKOV A , PUSTOGAROV I , WEINMANN R . Trawling for tor hidden services:detection,measurement,deanonymization[C]// 2013 IEEE Symposium on Security and Privacy(SP). 2013: 80-94.
|