共 9 条
[5]
僵尸网络对抗技术研究[D]. 王威.哈尔滨工业大学 2010
[6]
Honeypot detection in advanced botnet attacks[J] . Ping Wang,Lei Wu,Ryan Cunningham,Cliff C. Zou.Int. J. of Information and Computer Security . 2010 (1)
[7]
Botnet infiltration:Finding bugs in botnet command and control[EB OL]. Chia Y C,Juan C. http:www.eecs.berkeley.edu-chiayuan cs261 . 2009
[8]
Rise of the iBots:Owning a telco network. Mulliner C,SeifertIn J P. Proc of the5th IEEE Int Conf on Malicious and Unwanted Software (Malware) . 2010
[9]
BotMiner:Clustering analysis of network traffic for protocol-and structure-independent botnet detection. Gu G,Perdisct R,Zhang J,et al. Proc of the17th USENIX Security Symp . 2008