1 |
Y. Fan and N. Xu, "A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection," Int. Journal of Security and Its Applications, Vol.8, No. 3, pp.87-96, May 2014.
DOI
|
2 |
C. Sheng, H. Liang and L. Bo, "The P2P Botnet Online Detect Approach Research," Acta Electronica Sinica, Vol.39, No.4, pp. 906-912, Apr. 2011.
|
3 |
P. Barthakur, M. Dahal and M. GHose, "An Efficient Machine Learning Based Classification Scheme for Detecting Distributed Command & Control Traffic of P2P Botnets", International Journal of Modern Education and Computer Science, Vol. 5, No. 10, PP. 9-18, Oct. 2013.
DOI
|
4 |
P. Bharathula and N. Menon, "Equitable Machine Learning Algorithms to Probe Over P2P Botnets," Procs. of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications(FICTA), pp.13-21, Durgapur, India, Nov. 2015.
|
5 |
L H Liao and C. Chang, "Peer to Peer Botnet Detection Using Data Mining Scheme," Procs. of International Conference on Internet Technology and Applications. IEEE, pp. 1-4, Wuhan, China, Aug. 2010.
|
6 |
S. Garg, et al., "Behaviour analysis of machine learning algorithms for detecting P2P botnets," Procs. of IEEE 15th International Conference on Advanced Computing Technologies (ICACT): pp. 1-4, Rajampet, India, Sep. 2013.
|
7 |
P. Vadivu and K. Karthika, "A Survey on Botnet Dectection Approaches In Peer-To-Peer Network." International Journal of Advances in Computer Science and Technology, Vol 3, No.5, pp. 311-317, May 2014.
|
8 |
P. Wang, B. Aslam and C. Zou, "Peer-to-Peer Botnets," Handbook of Information and Communication Security, pp. 335-350, 2009.
|
9 |
Priyanka and M. Dave, "A review of recent Peer-to-Peer botnet detection techniques," Procs. of International Conference on Electronics and Communication Systems. IEEE, pp. 1312-1317, Coimbatore, India, Feb. 2015
|
10 |
R. Rodriguez-Gomes, G. Macia-Fernandez and P. Garcia-Tedoro, "Analysis of Botnets through Life-Cycle," Procs. of SECRYPT 2011 International Conference on Security and Cryptography, pp. 257-262, Seville, Spain, Jul. 2011.
|
11 |
N. Hachenm, et al., "Botnets: Lifecycle and Taxonomy," Procs. of 2011 Conference on Network and Information Systems Security (SAR-SSI), pp. 1-8, May. 2011.
|
12 |
J.B. Grizzard, et al., "Peer-to-peer botnets: overview and case study," Procs. of USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), pp. 1-8, Cambridge, USA, Apr. 2007.
|
13 |
J. Leonard, X. Shouhuai and S. Ravi, "A Framework for understanding botnets," Procs. of the international conference on availability, reliability and security, pp. 917-922, Fukuoka, Japan, Mar. 2009.
|
14 |
Y. Zeng and K. G. Shin, "On detection of storm botnets. Real-Time Computing Laboratory," Technical report CSE-TR-560-09, The University of Michigan, pp. 1-7, Dec. 2009.
|
15 |
W. Tarng, C-K. Chou and K-L. Ou, "A P2P Botnet Virus Detection System Based on Data-Mining Algorithms," International Journal of Computer Science & Information Technology, vol. 4, No. 5, pp. 51-65, Oct. 2012.
DOI
|
16 |
H. Li, et al., "Modeling to Understand P2P Botnets," Procs. of International Conference on Instrumentation and Measurement, Computer, Communication and Control, pp.75-78, Harbin City, China, Dec. 2012.
|
17 |
M. Alauthaman, "A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks," Neural Computer and Applications(First Online), Oct. 2016.
|
18 |
B. Rahbarinia, R. Perdisci, A. Lanzi and K. Li, "PeerRush: Mining for unwanted p2p traffic," DIMVA 2013-Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science, Vol. 7967. pp. 62-82, JUL. 2013.
|
19 |
S. Garg, S. K. Peddoju and A. K. Sarje, "Scalable P2P bot detection system based on network data stream," Peer-to-Peer Networking and Applications, Vol.9, No6, pp. 1162-1176, Nov. 2016.
DOI
|
20 |
E-S. Hong and M-K. Park, "Severity-based Software Quality Prediction using Class Imbalanced Data," Journal of the Korea Society of Computer and Information, Vol. 21, N0. 4, pp.73-80, Apr. 2016.
DOI
|
21 |
M. Soysal and E. G. Schmidt, "Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison," Performance Evaluation Vol.67. No.6, pp. 451-467, Jun. 2010.
DOI
|
22 |
M. Feeil and A. Shahrestani, "A survey of Botnet and Botnet Detection," Procs. of the Third International Conference on Emerging Security Information, systems and Technologies, pp. 268-273, Athens Greece, Jun. 2009.
|
23 |
W. Ye and K. Cho,"P2P and P2P Botnet Traffic Classification in Two Stages," Soft Computing, Vol. 21, No. 5, pp.1315-1326, Mar. 2017.
DOI
|
24 |
N. Kheir, X. Han and C. Wolley, "Behavioral fine-grained detection and classification of P2P bots," Journal of Computer Virology and Hacking Techniques, Vol. 11, No. 4, pp. 217-233, Nov. 2015.
DOI
|
25 |
M. Mahmoud, et al.,"A Survey on Botnet Architectures, Detection and Defences," International Journal of Network Security, Vol. 17, No.3, pp. 272-289, May 2015.
|
26 |
S. Silva, et al., "Botnets: A survey," Computer Networks, the International Journal of Computer & Telecommunications Networking, Vol. 57 No. 2, pp.378-403, Feb. 2013.
|
27 |
I. Ghafi, J. Svoboda and V. Prenosil, "A Survey on Botnet Command and Control Traffic Detection," International Journal of Advances in Computer Networks and Its Security, Vol.5, No,2, pp. 75-80, Apr. 2015.
|
28 |
A. Obeidat and M. Bawaneh, "Survey of the P2P botnet detection methods," International Journal of Emerging Trends of Technology in Computer Science, Vol.5, No.2, pp. 12-23, Apr. 2016.
|
29 |
S. Ghalebandi, R. Noor and A. Lashkari, "A Survey on P2P Botnets Detection," Procs. of International Conference on Communication and Broadband Networking (ICCBN 2011), Kuala Lumlur, Malaysia, Jun. 2011.
|
30 |
M. Elhalabi, et al., "A Review of Peer-to-Peer Botnet Detection Techniques", Journal of Computer Science, Vol. 10, No.1, pp. 169-177, Nov. 2013.
DOI
|
31 |
D. Zhao, et al., "Peer to Peer Botnet Detection Based on Flow Intervals," Information Security and Privacy Research-27th IFIP TC 11 Information Security and Privacy Conference, pp.87-102, Jun. 2012.
|
32 |
G. Gu, et al.,"BotMiner:clustering analysis of network traffic for protocol and structure independent botnet detection," SS'08 Procs of the 17th conference on Security Symposium, pp. 139-154, San Jose, USA, Aug. 2008.
|
33 |
P. Wang, et al., "A Systematic Study on Peer-to-Peer Botnets, " International Conference on Computer Communications and Networks, IEEE ICCCN 2009, pp.1-8, August 2009,
|
34 |
H. Jiang and X. Shao, "Detecting P2P botnets by discovering flow dependency in C&C traffic." Peer-to-Peer Networking and Applications, pp.320-331, Dec. 2014.
|
35 |
W. Ye and K. Cho, "P2P Traffic classification using Advanced heuristic Rules and Analysis of Decision Tree Algorithms," Journal of the Korea Society of Computer and Information, Vol. 19, No. 3, pp.45-54, Mar. 2014.
DOI
|
36 |
M. Yahyazadeh and M. Abadi, "BotOnus: An online unsupervised method for botnet detection," The ISC Int'l Journal of Information Security, Vol.4, No.1, pp. 51-62, Mar. 2012.
|
37 |
J. Kang and J Y Zhang, "Application Entropy Theory to Detect New Peer-to-Peer Botnet with Multi-chart CUSUM," Procs. of 2009 Second International Symposium on Electronic Commerce and Security, pp.471-475, Nanchang City, China, May 2009.
|
38 |
B. Wang, Z. Li, H. Tu and J. Ma, "Measuring Peer-to-Peer botnets using control flow stability," Procs. of IEEE International Conference on Availability, Reliability and Security ARES'09, pp. 663-669. Fukuoka, Japan, Mar. 2009.
|
39 |
S. K. Noh, et al.,"Detecting P2P Botnets Using a Multi-phased Flow Model," Procs. of Third International Conference on Digital Society. IEEE Computer Society, pp. 247-253, Cancun, Mexico, Feb. 2009.
|
40 |
W. Ye and K. Cho, "Hybrid P2P Traffic Classification with heuristic rules and machine Learning," Soft Computing, Vol. 19, No. 9, pp. 1815-1827, Sept. 2014.
|
41 |
H. Hang and X. Wei, "Entelecheia: Detecting p2p botnets in their waiting stage," Procs. of IFIP Networking Conference, pp. 1-9, Brooklyn, USA, May 2013.
|
42 |
P. Narang, et al., "Peershark: Detecting Peer-to-Peer Botnets by Tracking Conversions," IEEE Security and Privacy workshop, pp.108-115, SanJose, USA, May 2014.
|
43 |
Y Li, Y H, and Z Liang, "A P2P-Bonet Detection Model and Algorithms Based on Network Streams Analysis", International Conference on Future Information Technology and Management Engineering, Vol.1, pp. 55-58, Changzhou, China, Oct. 2010.
|