31. منابع
Messagelabs intelligence: 2010 annual security report. Technical report, Symantec Corp., 2010.
Battling botnets for control of computers—microsoft security intelligence report.Technical report, Microsoft Corp., Jan to
June 2010.
E. Stalmans, A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network, Information
Security South Africa Conference, 2011.
N. Jiang, J. Cao, Y. Jin, L.E. Li, Z. Zhang, Identifying suspicious activities through DNS failure graph analysis, in: 18th
IEEE International Conference on Network Protocols (ICNPs), 2010.
D. Plohmann, E. Gerhards-Padilla, F. Leder, Botnets: Detection,Measurement, Disinfection & Defence, Technical Report,
The European Network and Information Security Agency, 2011.
Nhauo Davuth and Sung-Ryul Kim, Classification of Malicious Domain Names using Support Vector Machine and Bi-
gram Method, International Journal of Security and Its Applications,Vol. 7, No. 1, 2013
L. Bilge, E. Kirda, C. Kruegel, M. Balduzzi, EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis, In ACM
Conference on Computer and Communication Security (CCS), 2011.
R. Villamarn-Salomn and J. C. Brustoloni. Bayesian bot detection based on DNS traffic similarity. In SAC’09: ACM
symposium on Applied Computing, 2009.
T.Holz, C. Gorecki, K. Rieck, and F.C. Freiling. Measuring and Detecting Fast-Flux Service Networks. In Annual Network
and Distributed System Security Symposium (NDSS), 2008
Mark Felegyhazi, Christian Kreibich, and Vern Paxson. On the potential of proactive domain blacklisting. In Proceedings
of the Third USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET),San Jose, CA, USA, April 2010.
Hyunsang Choi, Heejo Lee, Identifying botnets by capturing group activities in DNS traffic, journal of Computer Security,
Elsevier,2012.
A.M. Manasrah, A. Hasan, O.A. Abouabdalla, S. Ramadass, Detecting Botnet Activities Based on Abnormal DNS traffic,
International Journal of Computer Science and Information Security (IJCSIS), 2009.
31