[1]拒绝服务攻击详解之基础篇[EB/OL].[20100508].SKY_Server,http://wenku.baidu.com/view/b2544d37ee06eff9aef 80797.html.
[2]Xie Y, Yu F, Achan K, et al. How Dynamic are IP Addresses?[J]. ACM SIGCOMM Computer Communication Review, 2007,37(4):301312.
[3]李润恒, 王明华, 贾焰. 基于通讯特征提取和IP聚集的僵尸网络相似性度量模型[J]. 计算机学报, 2010,33(1):4554.
[4]Freiling F C, Holz T, Wicherski G. Botnet Tracking: Exploring a RootCause Methodology to Prevent Distributed DenialofService Attacks[J]. Lecture Notes in Computer Science, 2005,3679:319335.
[5]Rajab A.A Multifaceted Approach to Understanding the Botnet Phenomenon[C]∥Proc of the 6th ACM Internet Measurement Conference, 2006:4152.
[6]Dagon D, Zou C, Lee W. Modeling Botnet Propagation Using Time Zones[C]∥Proc of the 13th Annual Network and Distributed System Security Symp, 2006.
[7]Fabian M, Terzis M A. My Botnet is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging[C]∥Proc of the 1st Workshop on Hot Topics in Understanding Botnets, 2007:5.
[8]Dagon D, Gu G, Lee C, et al. A Taxonomy of Botnet Structures[C]∥Proc of the 23rd Annual Computer Security Applications Conference,2007:325339.
[9]Li Z, Hu J, Hu Z, et al. Measuring the Botnet Using the Second Character of Bots[J]. Journal of Networks, 2010,5(1):98105.
[10]Zhuang L, Dunagan J, Simon D R, et al. Characterizing Botnets from Email Spam Records[C]∥Proc of the 1st Vsenix Workshop on LargeScale Exploits and Emergent Threats,2008.
[11]国家计算机网络应急技术处理协调中心(CNCERT/CC)全国网络与信息技术培训项目管理中心(NTCMC).网络安全应急实践指南[M].北京:电子工业出版社, 2008.
[12]Chen Y. IRCBased Botnet Detection on HighSpeed Routers[C]∥Proc of the ARODARPADHS Special Workshop on Botnets Arlington,2006:235249. |