|
[1] Matija Stevanovic and Myrup Pedersen. An efficient flow-based botnet detection using supervised machine learning. Networking and Security Section, Department of Electronic Systems, . [2] Shang-Chiuan Su. Detecting p2p botnet in software defined network. Institute of Network Engineering College of Computer Science National Chiao Tung University. [3] Sharath Chandra Guntuku, Pratik Narang, and Chittaranjan Hota. Real-time peerto- peer botnet detection framework based on bayesian regularized neural network. Institute of Network Engineering College of Computer Science National Chiao Tung University. [4] Pratik Narang1, Chittaranjan Hota1, and VN Venkatakrishnan. Peershark: flowclustering and conversation-generation for malicious peer-to-peer traffic identification. EURASIP Journal on Information Security, 2014. [5] Charles A. Fowler and Robert J. Hammell II. Converting pcaps into weka mineable data. Department of Computer and Information Sciences Towson University. [6] John Brozycki. Capturing and analyzing packets with perl. SANS Institute InfoSec Reading Room. [7] Daniel Arndt. How to: Calculating flow statistics using netmate. URL http: //dan.arndt.ca/nims/calculating-flow-statistics-using-netmate/. [8] Anthony McGregor, Mark Hall, Perry Lorier, and James Brunskill. Flow clustering using machine learning techniques. The University of Waikato, New Zealand. [9] Sherif Saad, Issa Traore, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, and Payman Hakimian. Detecting p2p botnets through network behavior analysis and machine learning. Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), 2011. [10] Khalid Huseynov, Kwangjo Kim, and Paul D. Yoo. Semi-supervised botnet detection using ant colony clustering. Cryptography and Information Security, 2014. 39 Bibliography 40 [11] David Zhao, Issa Traore, Bassam Sayed, and ... Botnet detection based on traffic behavior analysis and flow intervals. Elsevier, 2013. [12] Tao Cai and Futai Zou. Detecting http botnet with clustering network traffic. [13] Chittaranjan Hota Pratik Narang, Jagan Mohan Reddy. Feature selection for detection of peer-to-peer botnet traffic. [14] Pijush Barthakur, Manoj Dahal, and Mrinal Kanti Ghose. Clusibothealer: Botnet detection through similarity analysis of clusters. Journal of Advances in Computer Networks, Vol. 3, No. 1, March 2015. [15] Nicolás García-Pedrajas, Aida de Haro-García, and Javier Pérez-Rodríguez. A scalable approach to simultaneous evolutionary instance and feature selection. Elsevier. [16] Matija Stevanovic and Jens Myrup Pedersen. An efficient flow-based botnet detection using supervised machine learning. Networking and Security Section, Depart- ment of Electronic Systems, Aalborg University, . [17] Paul Barford and Vinod Yegneswaran. An inside look at botnets. Computer Sciences Department University of Wisconsin, Madison. [18] Kamaldeep Singh, Sharath Chandra Guntuku, Abhishek Thakur, and Chittaranjan Hota. Big data analytics framework for peer-to-peer botnet detection. Elsevier. [19] Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. College of Computing, Georgia Institute of Technology. [20] . Botnet detection and collapse based on traffic analysis. , . [21] David Zhao. Botnet detection based on traffic behavior analysis and flow intervals. Elsevier. [22] Mosa Yahyazadeh and Mahdi Abadi. Botonus: An online unsupervised method for botnet detection. The ISC Int’l Journal of Information Security. [23] Wei Lu, Goaletsa Rammidi, and Ali A. Ghorbani. Clustering botnet communication traffic based on n-gram feature selection. Elsevier. [24] Norbert Pohlmanna Christian J. Dietricha, Christian Rossowa. Cocospot: Clustering and recognizing botnet command and control channels using traffic analysis. Elsevier. [25] Esraa Alomari and Selvakumar Manickama. Design, deployment and use of httpbased botnet testbed. National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Malaysia. Bibliography 41 [26] Pratik Narang, Jagan Mohan Reddy, and Chittaranjan Hota. Feature selection for detection of peer-to-peer botnet traffic. Department of Computer Science & Engineering Birla Institute of Technology and Science-Pilani. [27] Stevanovic Matija and Pedersen Jens Myrup. Machine learning for identifying botnet network traffic. Department of Computer Science & Engineering Birla Institute of Technology and Science-Pilani. [28] Vaibhav Nivargi. Machine learning based botnet detection. [29] Babak Rahbarinia and Roberto Perdisci. Peerrush: Mining for unwanted p2p traffic. Dept. of Computer Science, University of Georgia. [30] Khalid Huseynov and Kwangjo Kim. Unsupervised hadoop-based p2p botnet detection with threshold setting. Department of Computer Science, Korea Advanced Institute of Science and Technology. [31] Zoubin Ghahramani. Unsupervised learning. Gatsby Computational Neuroscience Unit University College London, UK. [32] Carl Livadas. Using machine learning techniques to identify botnet traffic. Inter- network Research Department BBN Technologies. [33] Lasse Trolle Borup. Peer-to-peer botnets: A case study on waledac. Kongens Lyngby 2009. |