[1] |
MCCARTY B . Botnets:big and bigger[J]. IEEE Security & Privacy, 2003,1(4): 87-90
|
[2] |
STONE-GROSS B , COVA M , CAVALLARO L ,et al. Your botnet is my botnet:analysis of a botnet takeover[C]// The 16th ACM Conference on Computer and Communication Security. 2009: 635-647.
|
[3] |
CUI X , FANG B X , YIN L H ,et al. Andbot:towards advanced mobile botnets[C]// The 4th Usenix Workshop on Large-scale Exploits and Emergent Threats. 2011:11.
|
[4] |
Linux/Mirai. How an old ELF malcode is recycled[EB/OL]. .
|
[5] |
World’s largest net:mirai botnet,client,echo loader,CNC source code released[EB/OL]. .
|
[6] |
Eir’s D1000 modem is wide open to being hacked[EB/OL]. .
|
[7] |
Trojan.Mirai.1[EB/OL]. .
|
[8] |
Gartner says 8.4 billion connected "things" will be in use in 2017,up 31 percent from 2016[EB/OL]. .
|
[9] |
汪胜聪, 滕勤, 左承基 . 综述单片机控制系统的抗干扰设计[J]. 现代电子技术, 2003,1: 7-9.
|
|
WANG S C , TENG Q , ZUO C J . Statement of an-ti-disturbance design in the micro-controller system[J]. Modern Electronic Technique, 2003,1: 7-9.
|
[10] |
吴春敏 . 基于 TR-069 协议的远程配置管理终端的研究与实现[D]. 成都:西南交通大学, 2006.
|
|
WU C M . Research and implementation of remote configuration management terminal base in TR-069 protocol[D]. Chengdu:Southwest Jiaotong University, 2006.
|
[11] |
张雪松, 徐小琳, 李青山 . 算法生成恶意域名的实时检测[J]. 现代电信科技, 2013,7: 3-8.
|
|
ZHANG X S , XU X L , LI Q S . The real-time detection of algorithmically generated malicious domain[J]. Modern Science &Technology of Telecommunications, 2013,7: 3-8.
|
[12] |
钟馗之眼.网络空间搜索引擎[EB/OL]. .
|
|
ZoomEye.Cyberspace Search Engine[EB/OL]. .
|
[13] |
Shodan[EB/OL]. .
|
[14] |
Censys[EB/OL]. .
|
[15] |
FOFA Pro. 网络空间安全搜索引擎[EB/OL]. .
|
|
FOFA Pro. The cyberspace search engine[EB/OL]. .
|
[16] |
FREILING F , HOLZ T , WICHERSKI G . Botnet tracking:Exploring a root-cause methodology to prevent distributed denial-of- service at-tacks[C]// The 10th European Symposium on Research in Computer Security (ESORICS 2005). 2005: 319-335.
|
[17] |
LI J H . Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space[J]. Chinese Journal of Network and Information Security, 2016,2(2): 16-29.
|