[1] |
ROSSOW C , DIETRICH C , BOS H . Detection of intrusions and malware,and vulnerability assessment[M]. Berlin: SpringerPress, 2013.
|
[2] |
MAHMOUD M , NIR M , MATRAWY A . A survey on botnet architectures,detection and defences[J]. International Journal of Network Security, 2015,17(3): 272-289.
|
[3] |
PU Y , CHEN X , CUI X ,et al. Data stolen trojan detection based on network behaviors[J]. Procedia Computer Science, 2013,17: 828-835.
|
[4] |
NIRMAL K , JANET B , KUMAR R . Phishing-the threat that still exists[C]// International Conference on Computing and Communications Technologies(ICCCT). IEEE, 2015: 139-143.
|
[5] |
CHEN C M , CHENG S T , CHOU J H . Detection of fast-flux domains[J]. Journal of Advances in Computer Networks, 2013,1(2): 148-152.
|
[6] |
VANIA J , MENIYA A , JETHVA H B . A review on botnet and detection technique[J]. International Journal of Computer Trends and Technology, 2013,4(1): 23-29.
|
[7] |
KHATTAK S , RAMAY N R , KHAN K R ,et al. A taxonomy of botnet behavior,detection and defense[J]. Communications Surveys & Tutorials,IEEE, 2014,16(2): 898-924.
|
[8] |
GARCíA S , UHLí? V , REHAK M . Identifying and modeling botnet C&C behaviors[C]// The 1st International Workshop on Agents and CyberSecurity. ACM, 2014.
|
[9] |
YADAV S , REDDY A K K , REDDY A L ,et al. Detecting algorithmically generated malicious domain names[C]// The 10th ACM SIGCOMM Conference on Internet Measurement. Melbourne,Australia, 2010: 48-61.
|
[10] |
FELEGYHAZI M , KREIBICH C , PAXSON V . On the potential of proactive domain blacklisting[C]// The 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats:Botnets,Spyware,Worms,and More. San Jose,CA,USA, 2010.
|
[11] |
刘爱江, 黄长慧, 胡光俊 . 基于改进神经网络算法的木马控制域名检测方法[J]. 电信科学, 2014,30(7): 39-42. LIU A J , HUANG C H , HU G J . Detection method of trojan's control domain based on improved neural network algorithm[J]. Telecommunications Science, 2014,30(7): 39-42.
|
[12] |
ANTONAKAKIS M , PERDISCI R , DAGON D ,et al. Building a dynamic reputation system for DNS[C]// USENIX Security Symposium. Washington,DC,USA, 2010: 273-290.
|
[13] |
ANTONAKAKIS M , PERDISCI R , LEE W ,et al. Detecting malware domains at the upper DNS hierarchy[C]// USENIX Security Symposium. San Francisco,CA,USA, 2011: 23-46.
|
[14] |
BILGE L , SEN S , BALZAROTTI D ,et al. Exposure:a passive DNS analysis service to detect and report malicious domains[J]. ACM Transactions on Information and System Security (TISSEC), 2014,16(4): 14-41.
|
[15] |
周勇林, 由林麟, 张永铮 . 基于命名及解析行为特征的异常域名检测方法[J]. 计算机工程与应用, 2011,47(20): 50-52. ZHOU Y L , YOU L L , ZHANG Y Z . Anomaly domain name detection method based on characteristics of name and resolution behavior[J]. Computer Engineering and Applications, 2011,47(20): 50-52.
|
[16] |
LENG Y , XU X , QI G . Combining active learning and semi-supervised learning to construct SVM classifier[J]. Knowledge-Based Systems, 2013,44: 121-131.
|
[17] |
YU B , SMITH L , THREEFOOT M . Machine learning and data mining in pattern recognition[M]. Berlin: SpringerPress, 2014.
|