[1] |
诸葛建伟, 韩心慧, 周勇林 ,等. 僵尸网络研究[J]. 软件学报, 2008(3): 702-715. ZHUGE J W , HAN X H , ZHOU Y L ,et al. Research and development of Botnets[J]. Journal of Software, 2008(3): 702-715.
|
[2] |
CNCERT/CC互联网安全威胁报告[EB/OL]. .CNCERT/CC Internet security threat report[EB/OL]. .
|
[3] |
江健, 诸葛建伟, 段海新 ,等. 僵尸网络机理与防御技术[J]. 软件学报, 2012,23(1): 82-96. JIANG J , ZHUGE J W , DUAN X H ,et al. Research on Botnet mechanisms and defenses[J]. Journal of Software, 2012,23(1): 82-96.
|
[4] |
FEDYNYSHYN G , CHUAH M , TAN G . Detection and classification of different Botnet C&C channels[A]. Proceedings of the 8th Interna-tional Conference[C]. Banff,Canada, 2011. 228-242.
|
[5] |
BINKLEY J R , SINGH S . An algorithm for anomaly-based Botnet detection[A]. Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet[C]. Berkeley,CA,USA, 2006. 43-48.
|
[6] |
TSAI M H , CHANG K C , LIN C C ,et al. C&C tracer:Botnet command and control behavior tracing[A]. Proceedings of the 2011 IEEE International Conference on Systems,Man and Cybernetics (SMC)[C]. Anchorage,AK, 2011. 1859-1864.
|
[7] |
GIROIRE F , CHANDRASHEKAR J , TAFT N ,et al. Exploiting temporal persistence to detect covert botnet channels[A]. Proceedings of the Recent Advances in Intrusion Detection[C]. Springer Berlin Heidelberg,Brittany,France, 2009. 326-345.
|
[8] |
LU C , BROOKS R . Botnet traffic detection using hidden models[A]. Proceedings of the Seventh Annual Workshop Cyber Security and Information Intelligence Research[C]. Oak Ridge,TN,USA, 2011.31
|
[9] |
BREZO F , SANTOS I , BRINGAS P G ,et al. Challenges and limita-tions in current botnet detection[A]. Proceedings of the 22nd Interna-tional Workshop on Database and Expert Systems Applications (DEXA)[C]. Toulouse, 2011. 95-101.
|
[10] |
HUA J , SAKURAI K . Botnet command & control based on sh message service and human mobility[J]. Computer Networks, 2012(57): 579-597.
|
[11] |
AKIYAMA M , KAWAMOTO T , SHIMAMURA M ,et al. A proposal of metrics for Botnet detection based on its cooperative behavior[A]. Proceedings of Applications and the Internet Workshops[C]. Hiroshi-ma,Japan, 2007.82.
|
[12] |
王爽 . 基于流量特征的 IRC 僵尸网络检测技术研究[D]. 哈尔滨 :哈尔滨工业大学, 2008. WANG S . Research of IRC Botnet Detection Technology Based on Traffic Flow Characteristics[D]. Harbin:Harbin Institute of Technolo-gy, 2008.
|
[13] |
孙吉贵, 刘杰, 赵连宇 . 聚类算法研究[J]. 软件学报, 2008,19(1): 48-61. SUN J G , LIU J , ZHAO L Y . Clustering algorithms research[J]. Journal of Software, 2008,19(1): 48-61.
|
[14] |
HANSEN P , NGAI E , CHEUNG B K ,et al. Analysis of global k-means,an incremental heuristic for minimum sum-of-squares clus-tering[J]. Journal of Classification, 2005,22(2): 287-310.
|
[15] |
陈德军, 罗金成, 张兵 . 基于改进的k-means聚类算法的分类评价方法[J]. 武汉理工大学学报, 2011,33(1): 32-35. CHEN D J , LUO J C , ZHANG B . Classification and evaluation on reviewers based on improved -means clustering algorithm[J]. Journalk of WUT(Information & Management Engineering), 2011,33(1): 32-35.
|