參考文獻 |
[1] Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., & Feamster, N. (2010, August). Building a Dynamic Reputation System for DNS. In USENIX security symposium (pp. 273-290).
[2] Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou II, N., & Dagon, D. (2011, August). Detecting Malware Domains at the Upper DNS Hierarchy. In USENIX security symposium (p. 16).
[3] Bilge, L., Sen, S., Balzarotti, D., Kirda, E., & Kruegel, C. (2014). EXPOSURE: a passive DNS analysis service to detect and report malicious domains. ACM Transactions on Information and System Security (TISSEC), 16(4), 14.
[4] Chen, C. M., Huang, J. J., & Ou, Y. H. (2015). Efficient suspicious URL filtering based on reputation. Journal of Information Security and Applications, 20, 26-36.
[5] Ghafir, I., & Prenosil, V. (2014, November). DNS query failure and algorithmically generated domain-flux detection. In Frontiers of Communications, Networks and Applications (ICFCNA 2014-Malaysia), International Conference on (pp. 1-5). IET.
[6] Grill, M., Nikolaev, I., Valeros, V., & Rehak, M. (2015, May). Detecting DGA malware using NetFlow. In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on (pp. 1304-1309). IEEE.
[7] Gržnić, T., Perhoč, D., Marić, M., Vlašić, F., & Kulcsar, T. (2014, May). CROFlux—Passive DNS method for detecting fast-flux domains. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014 37th International Convention on (pp. 1376-1380). IEEE.
[8] Hsu, F. H., Wang, C. S., Hsu, C. H., Tso, C. K., Chen, L. H., & Lin, S. H. (2014). Detect fast-flux domains through response time differences. IEEE Journal on Selected Areas in Communications, 32(10), (pp.1947-1956). IEEE.
[9] Janbeglou, M., Naderi, H., & Brownlee, N. (2014, May). Effectiveness of DNS-based security approaches in large-scale networks. In Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on (pp. 524-529). IEEE.
[10] Kwon, J., Kim, J., Lee, J., Lee, H., & Perrig, A. (2014, October). PsyBoG: Power spectral density analysis for detecting botnet groups. In Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on (pp. 85-92). IEEE.
[11] Rahbarinia, B., Perdisci, R., & Antonakakis, M. (2015, June). Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks. In Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on (pp. 403-414). IEEE.
[12] Schales, D. L., Christodorescu, M., Hu, X., Jang, J., Rao, J. R., Sailer, R., ... & Wang, T. (2014, August). Stream computing for large-scale, multi-channel cyber threat analytics. In Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on (pp. 8-15). IEEE.
[13] Soska, K., & Christin, N. (2014). Automatically detecting vulnerable websites before they turn malicious. In 23rd USENIX Security Symposium (USENIX Security 14) (pp. 625-640).
[14] Weimer, F. (2005, April). Passive DNS replication. In FIRST conference on computer security incident (p. 98).
[15] Yu, B., Smith, L., & Threefoot, M. (2014). Semi-supervised time series modeling for real-time flux domain detection on passive DNS traffic. In Machine Learning and Data Mining in Pattern Recognition (pp. 258-271). Springer International Publishing.
[16] Zhao, Guodong, Xu, K., Xu, L., & Wu, B. (2015). Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis. In IEEE Access : Big Data for Green Communications and Computing, (pp. 1132-1142). IEEE.
相關網站
[17] “Alexa - Actionable Analytics for the Web” [Online]. Available: http://www.alexa.com/
[18] “APT簡介”. [Online]. Available: http://www.cert.org.tw/assets/pdf/apt.pdf
[19] “HAMMERTOSS:Stealthy Tactics Define a Russian Cyber Threat Group” [Online]. Available: https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf
[20] “Malwr.com”. [Online]. Available: https://malwr.com/
[21] “Malware Domain Blocklist” [Online]. Available: http://www.malwaredomains.com/
[22] “Network sniffer that logs all DNS server replies for use in a passive DNS setup” [Online]. Available: https://github.com/gamelinux/passivedns
[23] “Passive DNS” [Online]. Available: http://meetings.apnic.net/__data/assets/pdf_file/0017/45521/05-Merike-Kaeo-Passive-DNS.pdf
[24] “Passive DNS Data Collection”. [Online]. Available: https://www.isc.org/blogs/join-the-global-passive-dns-pdns-network-today-gain-effective-tools-to-fight-against-cyber-crime/
[25] “Targeted Cyberattacks Logbook”. [Online]. Available: https://apt.securelist.com/#firstPage
[26] “virustotal”. [Online]. Available: https://virustotal.com/ |