[1] |
ZHAUNIAROVICH Y , KHALIL I , YU T ,et al. A survey on malicious domains detection through DNS data analysis[J]. ACM Computing Surveys, 2018,51(4):67.
|
[2] |
ALMOMANI A . Fast-flux hunter:a system for filtering online fast-flux botnet[J]. Neural Computing and Applications, 2018,29(7): 483-493.
|
[3] |
ZHOU C V , LECKIE C , KARUNASEKERA S . Collaborative detection of fast flux phishing domains[J]. Journal of Networks, 2009,4(1): 75-84.
|
[4] |
ZHOU C V , LECKIE C , KARUNASEKERA S ,et al. A self-healing,self-protecting collaborative intrusion detection architecture to trace-back Fast-flux phishing domains[C]// IEEE Network Operations and Management Symposium Workshop. Piscataway:IEEE Press, 2008: 321-327.
|
[5] |
AL-DUWAIRI B N , AL-HAMMOURI A T . Fast flux watch:a mechanism for online detection of fast flux networks[J]. Journal of Advanced Research, 2014,1(3): 1-7.
|
[6] |
MARTINEZ-BEA S , CASTILLO-PEREZ S , GARCIA-ALFARO J , . Real-time malicious fast-flux detection using DNS and bot related features[C]// 2013 Eleventh Annual International Conference on Privacy,Security and Trust. Piscataway:IEEE Press, 2013: 369-372.
|
[7] |
CAGLAYAN A , TOOTHAKER M , DRAPEAU D ,et al. Real-time detection of fast flux service networks[C]// Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security. 2009: 285-292.
|
[8] |
NAZARIO J , HOLZ T . As the net churns:fast-flux botnet observations[C]// Proceeding of 3rd International Conference on Malicious and Unwanted Software (MALWARE). 2008: 24-31.
|
[9] |
CAGLAYAN A , TOOTHAKER M , DRAPAEAU D ,et al. Behavioral patterns of fast flux service networks[C]// Proceeding of the 43rd Hawii International Conference on System Sciences (HICSS). Piscataway:IEEE Press, 2010: 1-9.
|
[10] |
HU X , KNYSZ M , SHIN K G . Measurement and analysis of global IP-usage patterns of fast-flux botnets[C]// Proceeding of IEEE INFORCOM. Piscataway:IEEE Press, 2011:15.
|
[11] |
PASSERINI E , PALEARI R , MARTIGNONI L ,et al. FluXOR:detecting and monitoring Fast-flux service networks[C]// Proceeding of the 5th Conference on Detection of Intrusion and Malware & Vulnerability Assessment(DIMVA). Berlin:Springer, 2008: 186-206.
|
[12] |
PERDISCI R , CORONA I , DAGON D ,et al. Detecting malicious Flux service networks through passive analysis of recursive DNS traces[C]// Twenty-Fifth Annual Computer Security Applications Conference. Los Alamitos:IEEE Computer Society, 2009: 311-320.
|
[13] |
LIN H T , LIN Y Y , CHIANG J W . Genetic-based real-time fast-flux service networks detection[J]. Computer Networks, 2013(57): 501-513.
|
[14] |
HUANG S Y , MAO C H , LEE H M . Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection[C]// Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security. New York:ACM Press, 2010: 101-111.
|
[15] |
HOLZ T , GORECKI C , RIECK K ,et al. Measuring and detecting Fast-flux service networks[C]// In Symposium on Network and Distributed System Security. 2008: 1-12.
|
[16] |
KNYSZ M , HU X , SHIN K G . Good guys vs.bot guise:mimicry attacks against fast-flux detection systems[C]// Proceeding of IEEE INFORCOM. Piscataway:IEEE Press, 2011: 1844-1852.
|
[17] |
HSU F H , WANG C S , HSU C H ,et al. Detect Fast-flux domains through response time differences[J]. IEEE Journal on Selected Areas in Communications, 2014,32(10): 1947-1956.
|
[18] |
BILGE L , KIRDA E , KRUEGEL C ,et al. EXPOSURE:finding malicious domains using passive DNS analysis[C]// Proceedings of the Network and Distributed System Security Symposium. 2011: 1-17.
|
[19] |
臧小东, 龚俭, 胡晓艳 . 基于 AGD 的恶意域名检测[J]. 通信学报, 2018,39(7): 15-25.
|
|
ZANG X D , GONG J , HU X Y . Detecting malicious domains based on AGD[J]. Journal on Communications, 2018,39(7): 15-25.
|
[20] |
FAKERI-TABRIZI A , NGUYEN T , LIU H L , .et al Analyzing DNS requests for anomaly detection:US 20160065611A1[P].(2016-03-03)[2019-10-31].
|
[21] |
LEI K , FU Q , NI J ,et al. Detecting malicious domains with behavioral modeling and graph embedding[C]// 2019 IEEE 39th International Conference on Distributed Computing Systems. Piscataway:IEEE Press, 2019: 601-611.
|
[22] |
SUN X , TONG M , YANG J ,et al. HinDom:a robust malicious domain detection system based on heterogeneous information network with transductive classification[C]// 22nd International Symposium on Research in Attacks,Intrusions and Defenses. Berkeley:USENIX Association, 2019: 399-412.
|
[23] |
SHI Y , CHEN G , LI J . Malicious domain name detection based on extreme machine learning[J]. Neural Processing Letters, 2018,48(3): 1347-1357.
|
[24] |
周昌令, 陈恺, 公绪晓 ,等. 基于Passive DNS的速变域名检测[J]. 北京大学学报(自然科学版), 2016,52(3): 396-402.
|
|
ZHOU C L , CHEN K , GONG X X ,et al. Detection of Fast-flux domains based on passive DNS analysis[J]. Acta Scientiarum Naturalium Universitatis Pekinensis, 2016,52(3): 396-402.
|