[1] |
CUI X , FANG B , SHI J ,et al. Botnet triple-channel model:towards resilient and efficient bidirectional communication botnets[C]// International Conference on Security and Privacy in Communication Systems. 2013: 53-68.
|
[2] |
KOLIAS C , KAMBOURAKIS G , STAVROU A ,et al. DDoS in the IoT:mirai and other botnets[J]. Computer, 2017,50(7): 80-84.
|
[3] |
EHRENFELD J M . Wannacry,cybersecurity and health information technology:a time to act[J]. Journal of Medical Systems, 2017,41(7):104.
|
[4] |
LIVADAS C , WALSH R , LAPSLEY D ,et al. Usilng machine learning technliques to identify botnet traffic[C]// 31st IEEE Conference on Local Computer Networks. 2006: 967-974.
|
[5] |
KONDO S , SATO N . Botnet traffic detection techniques by C&C session classification using SVM[C]// International Workshop on Security. 2007: 91-104.
|
[6] |
BILGE L , BALZAROTTI D , ROBERTSON W ,et al. Disclosure:detecting botnet command and control servers through large-scale netflow analysis[C]// The 28th Annual Computer Security Applications Conference. 2012: 129-138.
|
[7] |
FRAN?OIS J , WANG S , ENGEL T . BotTrack:tracking botnets using NetFlow and PageRank[C]// International Conference on Research in Networking. 2011: 1-14.
|
[8] |
GU G , PERDISCI R , ZHANG J ,et al. BotMiner:clustering analysis of network traffic for protocol-and structure-independent botnet detection[C]// USENIX Security Symposium. 2008: 139-154.
|
[9] |
CUI X , FANG B X , YIN L H ,et al. Andbot:towards advanced mobile botnets[C]// The 4th Usenix Workshop on Large-scale Exploits and Emergent Threats. 2011:11.
|
[10] |
ZHANG J , SAHA S , GU G ,et al. Systematic mining of associated server herds for malware campaign discovery[C]// 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS). 2015: 630-641.
|
[11] |
崔鹏飞, 裘玥, 孙瑞 . 面向网络内容安全的图像识别技术研究[J]. 信息网络安全, 2015(9): 154-157.
|
|
CUI P F , QIU Y , SUN R . Research on image recognition technology for the network content security[J]. Netinfo Security, 2015(9): 154-157.
|
[12] |
GUL K S Q 尹继泽, 潘丽敏, ,等. 基于深度神经网络的命名实体识别方法研究[J]. 信息网络安全, 2017(10): 29-35.
|
|
GUL K S Q , YIN J Z , PAN L M ,等. Research on the algorithm of named entity recognition based on deep neural network[J]. Netinfo Security, 2017(10): 29-35.
|
[13] |
ILGUN K , . USTAT:a real-time intrusion detection system for UNIX[C]// 1993 IEEE Computer Society Symposium on Research in Security and Privacy. 1993: 16-28.
|
[14] |
VIGNA G , KEMMERER R A . NetSTAT:a network-based intrusion detection approach[C]// 14th Annual Computer Security Applications Conference. 1998: 25-34.
|
[15] |
GU G , PORRAS P A , YEGNESWARAN V ,et al. BotHunter:detecting malware infection through IDS-driven dialog correlation[C]// USENIX Security Symposium. 2007: 1-16.
|
[16] |
WURZINGER P , BILGE L , HOLZ T ,et al. Automatically generating models for botnet detection[C]// European Symposium on Research in Computer Security. 2009: 232-249.
|
[17] |
ARSHAD S , ABBASPOUR M , KHARRAZI M ,et al. An anomaly-based botnet detection approach for identifying stealthy botnets[C]// 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE). 2011: 564-569.
|
[18] |
SAAD S , TRAORE I , GHORBANI A ,et al. Detecting P2P botnets through network behavior analysis and machine learning[C]// 2011 Ninth Annual International Conference on Privacy,Security and Trust (PST). 2011: 174-180.
|
[19] |
AL-JARRAH O Y , ALHUSSEIN O , YOO P D ,et al. Data randomization and cluster-based partitioning for botnet intrusion detection[J]. IEEE Transactions on Cybernetics, 2016,46(8): 1796-1806.
|
[20] |
VENKATESH G K , NADARAJAN R A . HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network[C]// WISTP. 2012: 38-48.
|
[21] |
TORRES P , CATANIA C , GARCIA S ,et al. An analysis of recurrent neural networks for botnet detection behavior[C]// 2016 IEEE Biennial Congress of Argentina (ARGENCON). 2016: 1-6.
|
[22] |
WANG W , ZHU M , ZENG X ,et al. Malware traffic classification using convolutional neural network for representation learning[C]// 2017 International Conference on Information Networking (ICOIN). 2017: 712-717.
|
[23] |
王勇, 周惠怡, 俸皓 ,等. 基于深度卷积神经网络的网络流量分类方法[J]. 通信学报, 2018,39(1): 14-23.
|
|
WANG Y , ZHOU H Y , FENG H ,et al. Network traffic classification method basing on CNN[J]. Journal on Communications, 2018,39(1): 14-23.
|
[24] |
HADDADI F , PHAN D T , ZINCIR-HEYWOOD A N . How to choose from different botnet detection systems?[C]// Network Operations and Management Symposium (NOMS). 2016: 1079-1084.
|
[25] |
ZHAO D , TRAORE I , SAYED B ,et al. Botnet detection based on traffic behavior analysis and flow intervals[J]. Computers & Security, 2013,39: 2-16.
|
[26] |
WATSON D , RIDEN J . The honeynet project:data collection tools,infrastructure,archives and analysis[C]// WOMBAT Workshop on Information Security Threats Data Collection and Sharing. 2008: 24-30.
|
[27] |
SZABó G , ORINCSAY D , MALOMSOKY S , et al . On the validation of traffic classification algorithms[C]// International Conference on Passive and Active Network Measurement. 2008: 72-81.
|