[1] LI C, JIANG W, ZOU X. Botnet: Survey and case study[C]// Proc of 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).Piscataway, NJ:IEEE,2009
[2] 崔丽娟. 僵尸网络综述 [J]. 信息安全研究, 2017, 3(7): 589-600.
[3] DAGON D. Botnet detection and response[C]// Proc of OARC workshop. Santa Clara: Cisco Systems,2005
[4] GEER D. Malicious bots threaten network security [J]. Computer, 2005, 38(1): 18-20.
[5] 方滨兴, 崔翔, 王威. 僵尸网络综述 [J]. 计算机研究与发展, 2011, 48(8): 1315.
[6] SOOD A K, ZEADALLY S. A taxonomy of domain-generation algorithms [J]. IEEE Security & Privacy, 2016, 14(4): 46-53.
[7] MCCARTY B. Botnets: Big and bigger [J]. IEEE Security & Privacy, 2003, 1(4): 87-90.
[8] ANTONAKAKIS M, PERDISCI R, NADJI Y, et al. From throw-away traffic to bots: detecting the rise of DGA-based malware[C]// Proc of 21st USE-NIX Security Symposium.Berkeley,
CA:USENIX,2012
[9] SCHIAVONI S, MAGGI F, CAVALLARO L, et al. Phoenix: DGA-based
botnet tracking and intelligence[C]//
Proc of International Conference on
Detection of Intrusions and Malware, and Vulnerability Assessment.Berlin,
German:Springer,2014
[10] WANG T-S, LIN H-T, CHENG W-T, et al. DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis [J]. Computers Security, 2017, 64: 1-15.
[11] BOSHMAF Y, MUSLUKHOV I, BE-ZNOSOV K, et al. Design and analy-sis of a social botnet [J]. Computer Networks, 2013, 57(2): 556-78.
[12] PLOHMANN D, YAKDAN K, KLATT M, et al. A comprehensive measurement study of domain generating malware[C]// Proc of 25th {USENIX} Security Symposium ({USENIX} Security 16).
[13] TRUONG D T, CHENG G. Detecting domain‐flux botnet based on DNS traffic features in managed network [J]. Security Communication Networks, 2016, 9(14): 2338-47.
[14] ANDERSON H S, WOODBRIDGE J, FILAR B. DeepDGA: Adversariallyt-uned domain generation and detection[C]// Proc of 2016 ACM Workshop on Artificial Intelligence and Security.New York:ACM,2016
[15] 王媛媛, 吴春江, 刘启和. 恶意域名检测研究与应用综述 [J]. 计算机应用与软件, 2019, 36(09): 310-6.
[16] YADAV S, REDDY A K K, REDD-YA N, et al. Detecting algorithmically generated domain-flux attacks with DNS traffic analysis [J]. IEEE/Acm Transactions on Networking, 2012, 20(5): 1663-77.
[17] PEREIRA M, COLEMAN S, YU B, et al. Dictionary extraction and detect-ion of algorithmically generated doma-in names in passive DNS traffic[C] //
Proc of International Symposium on
Research in Attacks, Intrusions, and
Defenses. Berlin,German:Springer,2018
[18] Highnam, Kate,Puzio Domenic,Luo Song et al. Real-time detection of dictionary dga network traffic using deep learning[J]. SN Computer Science,2021,2(2):1-17.
[19] CHOWDHURY S, KHANZADEH M, AKULA R, et al. Botnet detection using graph-based feature clustering [J]. Journal of Big Data, 2017, 4(1): 1-23.
[20] YU B, GRAY D L, PAN J, et al. Inline DGA detection with deep networks[C]// Proc of 2017 IEEE International Conference on Data Mining Workshops (ICDMW).Piscataway, NJ:IEEE.2017
[21] ANDERSON D.Wordninja[CP].2021.
https://github.com/keredson/wordninja
[22] DANIEL P. DGArchive-Fraunhofer F-KIE [DB].2021
|