[1] |
FABIAN M , TERZIM s . A multifaceted approach to understanding the botnet phenomenon[C]// 2006 ACM SIGCOMM Internet Measurement Conference (IMC). 2006.
|
[2] |
KWAK H , LEE C , PARK H ,et al. What is twitter,a social network or a news media[C]// 19th International Conference on World Wide Web,ACM. 2010: 591-600.
|
[3] |
ABRAHAM S,CHENGALUR-SMITH I . An overview of social engineering malware:Trends,tactics and implications[J]. Technology in Society, 2010,32(3):18196.
|
[4] |
LI S , YUN X , HAO Z ,et al. Modeling social engineering botnet dynamics across multiple social networks[J]. Information Security and Privacy Research, 2012: 261-272.
|
[5] |
ATHANASOPOULOS E , MAKRIDAKIS A , ANTONATOS S ,et al. Antisocial networks:turning a social network into a botnet[C]// Information Security,ICS. 2008: 146-160.
|
[6] |
MA X , GUAN X , TAO J ,et al. A novel IRC botnet detection method based on packet size sequence[C]// 2010 IEEE International Conference on Communications (ICC). 2010: 1-5.
|
[7] |
ZOU C , CUNNINGHAM R . Honeypot-aware advanced botnet construction and maintenance[C]// Dependable Systems and Networks,2006.DSN 2006.International Conference. 2006: 199-208.
|
[8] |
SU C , ZHANG L F , GUAN Y ,et al. A framework for P2P botnets[C]// International Conference on Communications and Mobile Computing. 2009.
|
[9] |
WANG P , SPARKS S , ZOU C . An advanced hybrid peer-to-peer botnet[J]. Dependable and Secure Computing,IEEE Transactions, 2010,7(2):11127.
|
[10] |
VOGT R , AYCOCK J . Attack of the 50 foot Botnet[EB/OL]. .
|
[11] |
李书豪, 云晓春, 郝志宇 ,等. MRRbot:基于冗余机制的多角色P2P僵尸网络模型[J]. 计算机研究与发展, 2011,48(8): 1488-1496.
|
|
LI S H , YUN X C , HAO Z Y ,et al. MRRbot:a multi-role and redundancy-based P2P botnet model[J]. Journal of Computer Research and Development, 2011,48(8): 1488-1496.
|
[12] |
HA D , YAN G , EIDENBENZ S ,et al. On the effectiveness of structural detection and defense against P2P-based botnets[C]// IEEE/IFIP International Conference on Dependable Systems & Networks,2009.DSN09. 2009: 297-306.
|
[13] |
李跃, 翟立东, 王宏霞 ,等. 一种基于社交网络的移动僵尸网络研究[J]. 计算机研究与发展, 2012,49(Suppl.): 1-8.
|
|
LI Y , ZHAI L D , WANG H X ,et al. Mobile botnet based on SNS[J]. Journal of Computer Research and Development, 2012,49(Suppl.): 1-8.
|
[14] |
KARTALTEPE E , MORALES J , XU S ,et al. Social network-based botnet command-and-control:emerging threats and countermeasures[C]// Applied Cryptography and Network Security. 2010: 511-528.
|
[15] |
THOMAS K , NICOL D . The koobface botnet and the rise of social malware[C]// Malicious and Unwanted Software (MALWARE),2010 5th International Conference. 2010: 63-70.
|
[16] |
NAGARAJA S , HOUMANSADR A , PIYAWONGWISAL P ,et al. Stegobot:a covert social network botnet[C]// Information Hiding,Springer. 2011: 299-313.
|
[17] |
CUI X , FANG B , YIN L ,et al. AndBot:towards advanced mobile botnets[C]// 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’11). 2011.
|
[18] |
LIU C , LU W , ZHANG Z ,et al. A recoverable hybrid C&C botnet[C]// 2011 6th International Conference on Malicious and Unwanted Software (MALWARE). 2011: 110-118.
|
[19] |
YADAV S , REDDY A K K , REDDY A L ,et al. Detecting algorithmically generated malicious domain names[C]// 10th ACM SIGCOMM Conference on Internet Measurement. 2010: 48-61.
|
[20] |
BORGELT C , KRUSE R . Induction of association rules:apriori implementation[C]// Compstat.Physica-Verlag HD. 2002: 395-400.
|