|
[1] C4.5 algorithm. https://en.wikipedia.org/wiki/C4.5_algorithm. [2] botnet-model. https://www.researchgate.net/figure/266209917_fig1_ Fig-1-Typical-ClientServer-Botnet-Command-and-Control-Topology. [3] iso-osi-layer-model-tcpip-model. http://programmerhelp404.blogspot.tw/ 2014/01/iso-osi-layer-model-tcpip-model.html. [4] Hypertext transfer protocol. http://www.studytonight.com/servlet/ introduction-to-web.php. [5] iotonlinestore’s report of iot device number. http://www.iotonlinestore. com/. [6] Highest botnet flow increasing by year. http://www.ithome.com.tw/news/ 111220. [7] Yaokai Feng. How to fight against botnets in iot. http://staff.cs.kyushu-u. ac.jp/data/event/2016/02/160107_Yaokai_Feng.pdf. [8] Machine Learning Group at the University of Waikato. Waikato, weka. http: //www.cs.waikato.ac.nz/ml/weka/. [9] weka classifiers trees j48. http://weka.sourceforge.net/doc.dev/weka/ classifiers/trees/J48.html. [10] Xindong Wu, Vipin Kumar, J Ross Quinlan, Joydeep Ghosh, Qiang Yang, Hiroshi Motoda, Geoffrey J McLachlan, Angus Ng, Bing Liu, S Yu Philip, et al. Top 10 algorithms in data mining. Knowledge and information systems, 14(1):1–37, 2008. [11] Huan Liu, Rudy Setiono, et al. A probabilistic approach to feature selection-a filter solution. In ICML, volume 96, pages 319–327, 1996. [12] Elaheh Biglar Beigi, Hossein Hadian Jazi, Natalia Stakhanova, and Ali A Ghorbani. Towards effective feature selection in machine learning-based botnet detection approaches. In Communications and Network Security (CNS), 2014 IEEE Conference on, pages 247–255. IEEE, 2014. [13] Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, and Y Thomas Hou. Peerclean: Unveiling peer-to-peer botnets through dynamic group behavior analysis. In Computer Communications (INFOCOM), 2015 IEEE Conference on, pages 316–324. IEEE, 2015. [14] Tao Cai and Futai Zou. Detecting http botnet with clustering network traffic. In School of Information Security Engineering Shanghai Jiao Tong University, pages 1–6, 2012. [15] Francisco Villegas Alejandre, Nareli Cruz Cortés, and Eleazar Aguirre Anaya. Feature selection to detect botnets using machine learning algorithms. In Electronics, Communications and Computers (CONIELECOMP), 2017 International Conference on, pages 1–7. IEEE, 2017. [16] Kyle Isom. Pypcapfile: a pure python library for handling libpcap savefiles. 2013. [17] NumPy developers. Numpy: Numpy is the fundamental package needed for scientific computing with python. 2005-2017. [18] Gerald Combs et al. Wireshark. https://www.wireshark.org/. [19] Hypertext transfer protocol. https://en.wikipedia.org/wiki/Hypertext_ Transfer_Protocol. [20] Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, and Kang Li. Peerrush: mining for unwanted p2p traffic. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 62–82. Springer, 2013. [21] Czech Republic CTU University. The ctu-13 dataset. a labeled dataset with botnet, normal and background traffic. 2013. [22] Erdem Alparslan, Adem Karahoca, and Dilek Karahoca. Botnet detection: Enhancing analysis by using data mining techniques. In Advances in Data Mining Knowledge Discovery and Applications. InTech, 2012.
|