|
[1] Botnet. https://en.wikipedia.org/wiki/Botnet [2] Khattak , S, Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A. A Taxonomy of Botnet Behavior, Detection, and Defense, Communications Surveys & Tutorials, IEEE, 2014. [3] Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim. Botnet Detection by Monitoring Group Activities in DNS Traffic, Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on, 2007. [4] Feily, M, Shahrestani, A, Ramadass, S.A. Survey of Botnet and Botnet Detection Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on, 2009. [5] Intrusion detection system. https://en.wikipedia.org/wiki/Intrusion_detection_system [6] Zeidanloo H.R., Shooshtari, M.J.Z. , Amoli, P.V., Safari, M., Zamani, M. [7] A taxonomy of Botnet detection techniques. Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 2010. [8] Honeypot. https://en.wikipedia.org/wiki/Honeypot_(computing) [9] Software-Defined Networking. https://en.wikipedia.org/wiki/Software-defined_networking [10] Software-Defined Networking (SDN) Definition. https://www.opennetworking.org/sdn-resources/sdn-definition [11] Mininet. https://github.com/mininet/mininet/wiki/Introduction-to-Mininet [12] Wireshark. https://en.wikipedia.org/wiki/Wireshark [13] Snort. https://zh.wikipedia.org/wiki/Snort
|