Acknowledgement
Grant : 지능형 악성코드 자동분석 및 경유.유포지 탐지기술
Supported by : 방송통신위원회, 정보통신산업진흥원
References
- Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, "Spamming Botnets: Signatures and Characteristics," SIGCOMM'08, pp.17-22, Aug. 2008
- J.P. John, A. Moshchuk, S.D. Gribble, and A. Krishnamurthy, "Studying Spamming Botnets Using Botlab," USENIX, 2009
- A. Mislove, M. Marcon, K.P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and Analysis of Online Social Networks," Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 2007
- F. Li, and M.H. Hsieh, "An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies," CEAS 2006-3rd Conference on Email and Anti-Spam, 2006
- A. Ranachandran, N. Feamster, and S. Vempala, "Filtering Spam with Behavioral Blacklisting," CCS'07, 2007
- L.H. Gomes, C. Cazita, and W. Meira, "Characterizing a Spam Traffic," IMC'04, 2004
- A. Ranmachandran and N. Feamaster, "Understanding the Network-Level Behavior of Spammers," SIGGOMM'06, 2006
- H. Husna, S. Phithakkinukoon,A. Palla, and R. Dantu, "Behavioral Blacklisting," CCS'07, 2007
- M. Bailey, E. Cooke, F. Jahnian, Y. Xu, and M. Karir. "A survey of botnet technology and defenses," In 2009 Cybersecurity Applications and Technology Conference for Homeland Security, pp. 299-304, 2009
- 정현철, 이상진, "국가 봇넷 대응 프레임워크 제안," 2009년도 정보보호학회 동계학술발표대회논문집, KIISC, 19(2) pp. 193-197, 2009년 12월.
- Wikipedia, http://en.wikipedia.org/wiki/ E-mail
- Symantec, http://www.symantec.com/
- BBC news. Criminals 'may overwhelm the web'. http://new.bbc.co.uk/2/hi/business/6298641 stm, 2007
- The Register, "DDoS attacks fall as crackers turn to spam," http://www.theregister.co.uk/2007/05/02/dos_trends_symantec/, 2007.
- MessageLabs, http://www.messagelabs. com/
- London Action Plan, http://www.londona-ctionplan.com/
- 조선일보, http://biz.chosun.com/site/data/html_dir/2010/06/11/2010061101547. html, 2010
- P. Graham, "Different Methods of Stopping Spam," http://www.windowsecurity. com/, 2003
- L. Lee, "Measures of distributional similarity," Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics, 1999
- L. Zhuang, J. Dunagan, D.R. Simon, H.J. Wang, and J.D. Tygar, "Characterizing Botnets From Email Spam Records," LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008