參考文獻 |
[1] Franklin, J., Paxson, V., Perrig, A., and Savage, S., "An inquiry into the nature and causes of the wealth of internet miscreants", in Proceedings of the 14th ACM conference on Computer and communications security, pp. 375-388, ACM, Alexandria, Virginia, USA, 2007.
[2] FBI National Press Office, Over One Million Potential Victims of Botnet Cyber Crime June 13, 2007 Available from: http://www.fbi.gov/news/pressrel/press-releases/over-1-million-potential-victims-of-botnet-cyber-crime.
[3] Yury Namestnikov, The economics of Botnets, July 22, 2009. Available from: http://www.securelist.com/en/analysis/204792068/The_economics_of_Botnets.
[4] ICANN, GNSO Issues Report on Fast Flux Hosting. March 2008.
[5] The Honeynet Project and Research Alliance, Know Your Enemy: Fast-Flux Service Networks, July 13, 2007. Available from: http://www.honeynet.org/papers/ff.
[6] Committee, I.S.a.S.A., SAC 025 SSAC Advisory on Fast Flux Hosting and DNS. 2008.
[7] Sharon Gaudin, InformationWeek, Storm Worm Erupts Into Worst Virus Attack In 2 Years, July 24, 2007. Available from: http://www.informationweek.com/news/201200849.
[8] RSA Online Fraud Reports, A Monthly Intelligence Report from the RSA® Anti-Fraud Command Center, July 2009. Available from: http://www.rsa.com/solutions/consumer_authentication/intelreport/FRARPT_DS_0709.pdf.
[9] Gartner, Inc., Gartner Says Number of Phishing E-Mails Sent to U.S. Adults Nearly Doubles in Just Two Years, November 9, 2006. Available from: http://www.gartner.com/it/page.jsp?id=498245.
[10] Gartner, Inc, Gartner Survey Shows Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks. Available from: http://www.gartner.com/it/page.jsp?id=565125.
[11] Zhou, C.V., Leckie, C., and Karunasekera, S., "Collaborative Detection of Fast Flux Phishing Domains", Journal of Networks, vol. 4, pp. 75-84, February 2009.
[12] Wikipedia, the free encyclopedia, Fully Qualified Domain Name. Available from: http://en.wikipedia.org/wiki/Fully_qualified_domain_name.
[13] International Organization for Standardization, ISO 3166-1 and ISO 3166-2 databases. Available from: http://www.iso.org/iso/country_codes/iso_3166_databases.htm.
[14] Internet Systems Consortium, Domain Information Groper (DIG). Available from: https://www.isc.org/software/bind.
[15] Holz, T., Gorecki, C., Rieck, K., and Freiling, F.C., "Measuring and Detecting Fast-Flux Service Networks", in Network and Distributed System Security Symposium, San Diego, CA, February 2008.
[16] RRDNS, Round Robin DNS Information and Services. Available from: http://www.rrdns.com/.
[17] Krishnamurthy, B., Wills, C., and Zhang, Y., "On the use and performance of content distribution networks", in Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 169-182, ACM, San Francisco, California, USA, 2001.
[18] Wikipedia, the free encyclopedia, Content Delivery Network. Available from: http://en.wikipedia.org/wiki/Content_delivery_network.
[19] Passerini, E., Paleari, R., Martignoni, L., and Bruschi, D., "FluXOR: Detecting and Monitoring Fast-Flux Service Networks", in Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 186-206, Springer-Verlag, Paris, France, 2008.
[20] Perdisci, R., Corona, I., Dagon, D., and Lee, W., "Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces", in Proceedings of the 2009 Annual Computer Security Applications Conference, pp. 311-320, IEEE Computer Society, 2009.
[21] Robert Lemos, Security Focus, Fast flux foils bot-net takedown, July 9, 2007. Available from: http://www.securityfocus.com/news/11473/.
[22] Caglayan, A., Toothaker, M., Drapeau, D., Burke, D., and Eaton, G., "Real-Time Detection of Fast Flux Service Networks", in Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp. 285-292, IEEE Computer Society, March 2009.
[23] Hsu, C.-H., Huang, C.-Y., and Chen, K.-T., "Fast-flux bot detection in real time", in Proceedings of the 13th international conference on Recent advances in intrusion detection, pp. 464-483, Springer-Verlag, Ottawa, Ontario, Canada, September 2010.
[24] Alexa the Web Information Company. Available from: http://www.alexa.com/.
[25] ATLAS: Arbor networks, inc. Available from: http://atlas.arbor.net/summary/fastflux.
[26] dnsbl.abuse.ch. Available from: http://dnsbl.abuse.ch/fastfluxtracker.php.
|