|
[1] Matija Stevanovic and Myrup Pedersen, An efficient flow-based botnet detection using supervised machine learning, Networking and Security Section, Department of Electronic Systems. [2] S. Zhang, Conversation-based P2P Botnet Detection with Decision Fusion, THE UNIVERSITY OF NEW BRUNSWICK, 2013. [3] C. H. H. T. S. Pratik Narang, Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets, Singapore: Department of Electrical and Computer Engineering, National University of Singapore, 2016. [4] Babak Rahbarinia, Roberto Perdisci Andrea Lanzi, Kang Li, PeerRush: Mining for Unwanted P2P Traffic, Dept. of Computer Science, University of Georgia, Athens, GA 30602, USA. [5] Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Ian Herwono, Survey of approaches and features for the identification of HTTP-based botnet traffic, University of London, London, United Kingdom: School of Mathematics, Computer Science and Engineering, 2016. [6] Sergio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto, Ronaldo M.Salles, Botnets: A survey, Brazil: Military Institute of Engineering, 2013. [7] Kisom, “kisom/pypcapfile,”https://github.com/kisom/pypcapfile. [8] Experts in network security monitoring and network forensics, “Publicly available PCAP files,”http://www.netresec.com/?page=PcapFiles. [9] “python pypcapfile,” Python Software Foundation, https://pypi.python.org/pypi/pypcapfile. [10] “Weka 決策樹分類法使用教學/ Weka J48 Decision Tree Classification Tutorial,” 19/ 5/ 2016. http://blog.pulipuli.info/2016/05/weka-weka-j48-decision-tree.html. [11] “Weka的BayesNet分類器操作說明 / A Tutorial on BayesNet Classifier with WEKA,” 28/ 10/ 2014. http://blog.pulipuli.info/2014/10/wekabayesnet-tutorial-on-bayesnet.html. [12] “MALWARE-TRAFFIC-ANALYSIS.NET,” 2014-2017. http://malware-traffic-analysis.net/training-exercises.html. [13] WIKIPEDIA, “Botnet,” https://en.wikipedia.org/wiki/Botnet. [14] Jaime Alvarez, Botnet Detection Using Unsupervised Machine Learning, Hsinchu, Taiwan: Institute of Information Systems and Applications, National Tsing Hua University, 2015. [15] Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, Y. Thomas Hou, PeerClean: Unveiling Peer-to-Peer Botnets through Dynamic Group Behavior Analysis, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA: IEEE Conference on Computer Communications (INFOCOM), 2015. [16] Elaheh Biglar Beigi, Hossein Hadian Jazi, Natalia Stakhanova and Ali A. Ghorbani, Towards Effective Feature Selection in Machine Learning-Based Botnet Detection Approaches, Information Security Center of Excellence Faculty of Computer Science, University of New Brunswick, Fredericton, Canada: IEEE Conference on Communications and Network Security, 2014. [17] “Weka (machine learning),” WIKIPEDIA, https://en.wikipedia.org/wiki/Weka_(machine_learning). [18] Nabil Hachem, Yosra Ben Mustapha, Gustavo Gonzales Granadillo and Herve Debar, Botnets: Lifecycle and Taxonomy, Evry, France: Institute TELECOM, 2011. [19] Wireshark教學, http://blog.shaolin.tw/2008/03/wireshark.html |