Browse > Article

봇넷 분류법 및 진화된 봇넷 구조  

Jeon, Yong-Hee (대구가톨릭대학교 컴퓨터정보통신공학부)
Oh, Jin-Tae (한국전자통신연구원 정보보호연구본부 보안게이트웨이연구팀)
Keywords
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 AOL Instant Messenger, http://en.wikipedia.org/wiki/AOL_Instant_ Messenger
2 I. Arce and E. Levy, "An analysis of the slapper worm", IEEE Security and Privacy Magazine, Jan.-Feb. 2003
3 Andre Fucs, Augusto Paes de Barros, and Victor Pereira, "New botnets trends and threats", Web document
4 Julian B. Grizzard et al., "Peer-to-Peer Botnets: Overview and Case Study", http://www.usenix.org/event/hotbots07/tech/full_ papers/grizzard/grizzard_html/
5 Jau-Hwang Wang et al., "Virus detection using data mining techniques", Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security, 2003
6 Ping Wang, Sherri Sparks and Cliff C. Zou, "An Advanced Hybrid Peer-to-Peer Botnet", Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007
7 전용희, "봇넷 개요 및 전망 분석", 한국정보보호학회 정보보호학회지 제 18권 제 3호, pp.101-108, 2008년 6월   과학기술학회마을
8 나재훈, "P2P 지식정보보안 기술 및 표준동향, ITFind 메일진 353호, 2008.7.4
9 Evan Cooke, Farnam Jahanian, and Danny McPherson, "The Zombie Roundup:Understanding, Detecting, and Disrupting Botnets". Proc. of Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI '05), Boston, 2005
10 Ramneek Puri, Bots & Botnet:An Overview, GSEC Practical Assignment Version 1.4b, Aug. 2003, SANS Institute
11 Phatbot trojan analysis, Http://www.lurhq.com/phatbot.html
12 Sinit P2P trojan analysis, Http://www.lurhq.com/sinit.html
13 Malware Tunneling in IPv6, http://www.us-cert.gov/reading_room/ IPv6Malware- Tunneling.pdf
14 Jianwei Zhuge et al., "Characterizing the IRCbased Botnet Phenomenon", Reihe Informatik, TR-2007-010, Dec. 2007
15 장영준, 차민석, 정진성, 조시행, "악성 코드 동향 과 그 미래 전망", 한국정보보호학회 정보보호학회지 제 18권 제 3호, pp.1-16, 2008년 6월   과학기술학회마을
16 정현철, Detection and Response Technology for Botnets, KRnet '08 자료, 2008.6.25
17 Trend Micro, Taxonomy of Bonet Threats, A Trend Micro White Paper, Nov. 2006
18 LURHQ Threat Intelligence Group, Bobax Trojan Analysis, http://www.lurhq.com/bobax.html
19 http://www.skype.com/helloagain.html