Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

BIBILOGRAPHY

A Bijalwan, M. Wazid, E. S. Pilli, and R. C. Joshi, Forensics of random-UDP flooding


attacks, Journal of Networks, vol. 10, no. 5, pp. 287-293, 2015.

A K. Soodn, R. J. Enbody, Crimeware-as-a-service—A survey of commoditized crimeware


in the underground market, Internation al journal of critical infrastructu protection vol - 6(
2013 ) p 28 – 38.

Akkaladevi S and Katangur A K (n.d), Defending against Botnets, Retrieved on 03 April


2017 from http://ciacd.tamucc.edu/Files/Defending%20Againts%20Botnets

Alden W. Jackson, D. Lapsley, C. Jones , SLINGbot: A System for Live Investigation of


Next Generation Botnets, BBN Technologies ,10 Moulton Street Cambridge, MA 01845,
USA.

Arshad S, Abbaspour M, Kharrazi M, & Sanatkar H, (2011). An anomaly-based botnet


detection approach for identifying stealthy botnets., In Computer Applications and Industrial
Electronics (ICCAIE), 2011 IEEE International Conference on (pp. 564–569). IEEE.

B. Anchit and S. Harvinder, Investigation of UDP Bot Flooding Attack, Indian Journal of
Science and Technology, vol. 9, no. 21, 2016.

B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer,C. Kruegel,


and G. Vigna, Your Botnet isMy Botnet: Analysis of a Botnet Takeover, in ACM Conference
on Computer and Communications Security (CCS), November2009.

Baecher P, Koetter, M, Holz, T, Dornseif M, & Freiling F, (2006). The nepenthes platform:
An efficient approach to collect malware. In International Workshop on Recent Advances in
Intrusion Detection (pp. 165–184). Springer.

Barthakur P, Dahal M and Ghose M K (2013), An Efficient Machine Learning Based


Classification Scheme for Detecting Distributed Command & Control Traffic of P2P Botnets,
I J Modern Education and Computer Science, Vol-10, pp 9-18.

133
Bhatia S, Schmidt D, Mohay G, Tickle A. A framework for generating realistic traffic for
Distributed Denial-of-Service attacks and Flash Events. Computers & Security. 2014;40:95–
107.

Bijalwan A, Pilli E. S, Crime psychology using network forensics. Journal of Computer


Engineering & Information Technology, 3, (2014). doi: 10.4172/2324-9307.1000120

Bijalwan A, Wazid M, Pilli ES, Joshi RC. Forensics of Random-UDP Flooding Attacks.
Journal of Networks. 2015;10(5):287–93.

Bijalwan Anchit, Emmanuel S. Pilli, Understanding Botnet on Internet, IEEE International


Conference on Computational Intelligence and Computing Research, 978-1-4799-3975-6/14,
2014.

Bijalwan and E. S. Pilli, Understanding botnet on Internet, in Computational Intelligence


and Computing Research (ICCIC), 2014 IEEE International Conference on, 2014, pp. 1-5.

Binsalleeh H (2014), Botnets: Analysis, Detection, and Mitigation, IGI Global.

Brodsky A, & Brodsky D, (2007). A Distributed Content Independent Method for Spam
Detection, HotBots, 7, 3.

Bu Z et al (2010), The New Era of Botnets, McAfee Company.

C. Mazzariello ,University of Napoli Federico II, ―IRC traffic analysis for botnet detection‖,
The Fourth International Conference on Information Assurance and Security.

Casey E, ―Network traffic as a source of evidence: tool strengths, weakness, and future
needs‖ , Digital Investigation 1, 28-43 (2004).

Chen L M, Chen M C, Liao W, Sun Y. S , A Scalable network forensics mechanism for


stealthy self-propagating attacks. Computer Communications, 36, 1471-1484, (2013).

134
Chen W, Yeung D-Y, editors. Defending against TCP SYN flooding attacks under different
types of IP spoofing, 2006 ICN/ICONS/MCL, International Conference on Networking,
Systems and Mobile Communications and Learning Technologies. IEEE, 2006.

Chen Y, Hwang K, editors. Spectral analysis of TCP flows for defense against reduction-of-
quality attacks, 2007 ICC‘07 IEEE International Conference on Communications.IEEE,2007.

Christodorescu M, Jha S, Seshia S.A, Song D and R.E.Bryant. (2005) Semantics- malware
detection, In Proceedings of the IEEE Symposium on Security and Privacy.

Chuiyi X, Yizhi Z, Yuan B, Shuoshan L, Qin X, editors. A distributed intrusion detection


system against flooding denial of services attacks. 2011 13th International Conference on
Advanced Communication Technology (ICACT). IEEE, 2011.

Ciardhuain S O , An extended model of cybercrime investigations. International Journal of


Digital Evidence, 3(2), 1-22 (2004).

Conficker C Analysis, http://mtc.sri.com/Conficker/addendumC/.

Cooke E , F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting,


and disrupting botnets. In Workshop on Steps to Reducing Unwanted Traffic on the Internet
(SRUTI‘05), pages 39–44. USENIX, June 2005.

D. Zhao , I. Traore , B Sayed , W. Lu , S. Saad ,A.Ghorbani , D. Garant, Botnet detection


based on traffic behavior analysis and flow intervals, computers & security, 39 ( 2013 ) 2 -
16.

Dagon D et al (n.d), A Taxonomy of Botnet Structures, Retrieved on 03 April 2017 from:


http://faculty.cs.tamu.edu/guofei/paper/Dagon_acsac07_botax.pdf

E. Stalmans, A Framework for DNS based detection and mitigation of malware infections on
a network, Security and Networks Research Group Department.

135
Elhadi Ammar Ahmed E, Mohd Aizaini Maarof and Ahmed Hamza Osman, Malware
Detection Based on Hybrid Signature Behaviour Application Programming Interface Call
Graph , American Journal of Applied Sciences 9 (3): 283-288, 2012.

Eslahi M, Salleh R and Anuar N B (2012), ―Bots and Botnets: An Overview of


Characteristics, Detection and Challenges‖, Retrieved from:
http://repository.um.edu.my/25260/1/Bots%20and%20Botnets-
An%20Overview%20of%20Characteristics,%20Detection%20and%20Challenges%20(FINA
L).pdf

European Expert Group for IT-Security. http://www.eicar.org/

Filiol E, Helenius M, Zanero S. Open problems in virology, J. Comput. Virol. 1 (3–4) (2006).

Freiling F. C, Holz T, & Wicherski, G. (2005). Botnet tracking: Exploring a root-cause


methodology to prevent distributed denial-of-service attacks. In European Symposium on
Research in Computer Security (pp. 319–335). Springer.

F-secure Cabir. (2006). Access from http://www.f-secure.com/v-descs/cabir.shtml, 29-10-


2011.

F-Secure. SymbOS, (2006) Acallno Trojan description, Access from


http://www.fsecure.com/swdesc/acallnoa.shtml, August 2006, 29-10-2011.

Gadhiya Savan, KaushalBhavsar, Techniques for Malware Analysis, International Journal of


Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4,
April 2013.

Geddam R, and R. Vasikarla, Vulnerabilities of wireless environment, in Proc. 6th World


Multiconference on Systemics, Cybernetics and Informatics, July 14-18, Orlando, FL, USA,
2002, pp. 471-6.

Geers, K. (2011). Strategic cyber security, Kenneth Geers.

Goebel J, & Holz T, (2007). Rishi: Identify Bot Contaminated Hosts by IRC Nickname
Evaluation. HotBots, 7, 8.

136
Goodman N (2017), A Survey of Advances in Botnet Technologies, Retrieved from:
https://arxiv.org/pdf/1702.01132

Gu G, Perdisci R, Zhang J, & Lee W, (2008). BotMiner: Clustering Analysis of Network


Traffic for Protocol-and Structure-Independent Botnet Detection. In USENIX Security
Symposium (Vol. 5, pp. 139–154).

Gupta BB, Joshi RC, Misra M. ANN Based Scheme to Predict Number of Zombies in a
DDoS Attack, IJ Network Security. 2012;14(2):61-70.

H. Rouhani Zeidanloo, A. Bt Abdul Manaf, Botnet Detection by Monitoring Similar


Communication Patterns, (IJCSIS) International Journal of Computer Science and
Information Security, Vol. 7, No. 3, 2010.

H. Rouhani Zeidanloo, A. Bt Abdul Manaf, R. Bt Ahmad, M. Zaman, A Proposed


Framework for P2P Botnet Detection, IACSIT International Journal of Engineering and
Technology, Vol.2, No.2, April 2010.

H. Rouhani Zeidanloo, A. Bt Manaf, P. Vahdani, F. Tabatabaei, M. Zamani, Botnet


Detection Based on Traffic Monitoring, 2010 International Conference on Networking and
Information Technology‖.

H. Singh and A. Bijalwan, A survey on Malware, Botnets and their detection, International
Journal of Advanced Engineering Research and Science (IJAERS), vol. 03, no. 03, 2016.

Hamad Fadi, Leonid Smalov and Anne James, Energy-aware Security in M-Commerce and
the Internet of Things, Iete Technical Review | Vol 26 | Issue 5 | Sep-Oct 2009, pp 357-362.

Holz T, Steiner M, Dahl F, Biersack E, & Freiling F. C, (2008). Measurements and


Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. LEET, 8(1), 1-9.

Holz T, Steiner M, Dahl F, Biersack E, & Freiling F. C. (2008). Measurements and


Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. LEET, 8(1), 1–9.

137
Honey net Project, Know your Enemy: Tracking Botnets, March 2005.
http://www.honeynet.org/papers/bots.

Hussain S M, Beigh GR, editors. Impact of DDoS attack (UDP Flooding) on queuing
models. 2013 4th International Conference on Computer and Communication Technology
(ICCCT). IEEE, 2013.

Information Warfare Monitor., http://www.infowar-monitor.net/

INFSO and EPoSS, Internet of Things in 2020: A Roadmap for the Future, Workshop
Report, EC INFSO and EPoSS, Belgium, 2008.

ITU, The Internet of Things, ITU Internet Reports 2005, Executive Summary, 2005
(available at: http://www.itu.int/osg/spu/
publications/internetofthings/InternetofThings_summary.pdf ).

Jacob B (2010), Experimental Host- and Network-based Analyser and Detector for Botnets,
Retrieved from: http://www.soc.napier.ac.uk/~bill/ben.pdf

Jamaluddin J, N. Zotou, R. Edwards, and P. Coulton, Mobile phone vulnerabilities: A new


generation of malware, in Proc. 2004 IEEE International Symposium on Consumer
Electronic Conference, Sept 1-3, Reading, UK, 2004, pp199-201.

Jonathan A.P. Marpaung, MangalSain and Hoon-Jae Lee, Survey on malware evasion
techniques: state of the art and challenges, International Conference of Advanced
Communication Technology, pp 19-22, 2012.

Joshi S, Khanna R and Joshi L K (2015), Android Botnet: An Upcoming Challenge, IOSR
Journal of Computer Engineering, pp 05-10.

K. Singh ,S. Chandra Guntuku , A. Thakur , C. Hota. Big Data Analytics framework for
Peer-to-Peer Botnet detection using Random Forests , Information Sciences 278 (2014)

Kaur N (2014), Review on Botnets: The Biggest Threat to the Cyber-Security, International
Journal of Computer Application, 4 (4).

138
Kim H, Kim B, Kim D, Kim I-K, Chung T-M. Implementation of GESNIC for web server
protection against HTTP GET flooding attacks, Springer: Information Security Applications.
2012; p. 285–95.

Kim Won n, Ok-RanJeong, Chulyun Kim and Jungmin So, The dark side of the Internet:
Attacks, costs and responses, Elsevier‗s Journal of Information Systems, Volume 36, Issue 3,
May 2011, pp 675-705.

Kohn M. D, Eloff M. M. Eloff J. H. P.: Integrated digital forensic process model. Computer
& Security 38, 103-115 (2013).

Kong J, Mirza M, Shu J, Yoedhana C, Gerla M, Lu S, editors. Random flow network


modeling and simulations for DDoS attack mitigation. 2003 ICC‘03 IEEE International
Conference on Communications. IEEE, 2003.

Kramer Simon, Julian C. Bradfield, A general definition of malware , J ComputVirol (2010)


6:105–114 DOI 10.1007/s11416-009-0137-1.

Kugisaki Y, Kasahara Y, Hori Y, & Sakurai K. (2007). Bot detection based on traffic
analysis. In Intelligent Pervasive Computing, 2007. IPC. The 2007 International Conference
on (pp. 303–306). IEEE.

L. Mendonça, H. Santos, Botnets: A Heuristic-Based Detection Framework, Centro


ALGORITMI University of Minho Braga, Portugal.

L. Yeh, Y. Tsai. An Automated Framework for Command and Control Server Connection
and Malicious Mail Detection, ICNS 2015 The Eleventh International Conference on
Networking and Services.

Lasco and Symbos. (2006). Access from http://www.f-secure.com/v-descs/lasco a.shtml, 29-


10-2011.

Lee Y, & Lee Y, (2011). Detecting ddos attacks with hadoop. In Proceedings of The ACM
CoNEXT Student Workshop (p. 7). ACM.

139
Li M, Li J, Zhao W, editors. Simulation study of flood attacking of ddos. 2008 ICICSE‘08
International Conference on Internet Computing in Science and Engineering, IEEE, 2008.

Limarunothai R and Munlin M A (2015), Trends and Challenges of Botnet Architectures and
Detection Techniques. ,Journal of Information Science and Technology, 5 (1).

Liu C, Singhal A, Wijesekera D, (2015). A logic-based network forensic model for evidence
analysis, IFIP Advances in Information and Communication Technology 462, 129-145 .

Liu L, Chen S, Yan G, & Zhang, Z. (2008). Bottracer: Execution-based bot-like malware
detection. In International Conference on Information Security (pp. 97–113). Springer.

Liu Z, Feng D, (2005) Incremental fuzzy decision tree-based network forensic system.
Conference on Computational and Information Science 3802, 995-1002.

Lokhande P S and Meshram B B (2014), Botnet: Understanding Behavior, Lifecycle events


and Actions, International Journal of Advanced Research in Computer Science and Software
Engineering, 4 (3).

Lu Z, Wang W and Wang C (2014), How Can Botnets Cause Storms? Understanding the
Evolution and Impact of Mobile Botnets, IEEE.

Lutui R, A multidisciplinary digital forensic investigation process model . Business Horizons


59, 593-604 (2016).

M Cremonini and M Riccardi, The Dorothy Project: An Open Botnet Analysis Framework
for Automatic Tracking and Activity Visualization. , University of Milan Milano, Italy

M. Riccardi, D. Oro and J. Luna, A Framework For Financial Botnet Analysis, Barcelona
Digital Technology Centre Barcelona, Spain jluna@bdigital.org

Mahmoud M, Nir M and Matrawy A (2015), A Survey on Botnet Architecture, Detection and
Defences, International Journal of Network Security, 17 (3), pp 272-289.

140
Mandia K, Procise C, Incident Response and Computer Forensics, Osborne McGraw-Hill,
New York, (2003).

Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H.
Witten. The weka data mining software: an update. SIGKDD Explor. Newsl,11(1):10–18,
2009.

Masud M. M, Al-Khateeb T , Khan L., Thuraisingham B, & Hamlen K. W. (2008). Flow-


based identification of botnet traffic by mining multiple log files. In Distributed Framework
and Applications, 2008. DFmA 2008. First International Conference on (pp. 200–206). IEEE.

Mathur Kirti, Saroj Hiranwal, A Survey on Techniques in Detection and Analyzing Malware
Executables, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 4, April 2013.

Matthew G. S, Eleazar Eskin, Erez Zadok& Salvatore J. S (2001) ―Data Mining Methods
forDetection of New Malicious Executables‖ 1081-601 1/01 $10.00 0 2001 IEEE.

McCarty B , (2003). Botnets: Big and bigger. IEEE Security & Privacy, 99(4), 87–90.

McQuade S. C. (2009). Encyclopedia of cybercrime. Greenwood Press Westport.

Midha K, Rajawat K and Rathore V S (2012), An Introduction to Botnet Attacks and Its
Solutions, International Journal of Computer Applications and Information Technology, 1
(2).

Mohay G, Ahmed E, Bhatia S, Nadarajan A, Ravindran B, Tickle AB, et al. Detection and
mitigation of high-rate flooding attacks. Springer:An Investigation into the Detection and
Mitigation of Denial of Service (DoS) Attacks. 2011; p. 131–81.

Moustis D, Kotzanikolaou P, editors. Evaluating security controls against HTTP-based


DDoS attacks. 2013 Fourth International Conference on Information, Intelligence, Systems
and Applications (IISA). IEEE, 2013.

141
N. Paxton, G. Ahn, B. Chu, Towards Practical Framework for Collecting and Analyzing
Network-Centric Attacks, University of North Carolina at Charlotte.

Nagesh A , Distributed network forensics using JADE mobile agent


framework . Master‘s thesis, Arizona State University (2007).

Ndatinya V, Xiao Z , Manepalli V R, Meng K, Xiao Y, Network forensic analysis using


Wireshark. International Journal of Sensor Networks, 10, 91-106, (2015).

Ogu E C et al (2016), On the Internal Workings of Botnets: A Review, International Journal


of Computer Applications, 138 (4).

P. Porras, H. Saidi, and V. Yegneswaran, An Analysis of Conficker‘s Logic and


RendezvousPoints, Tech. Rep., March 2009.

P. Sharma, S. Tiwari, A. Bijalwan, E. Pilli, Botnet Detection Framework, International


Journal of Computer Applications (0975 – 8887) Volume 93 – No.19, May 2014.

Padmavathi B et al (2016), A Review Paper on Botnet, International Journal of Innovative


Research in Computer and Communication Engineering, 4 (10).

Palmer G. L, Forensic analysis in digital world. International Journal of Digital Evidence,


1(1), 1-6 (2002).

Park J-S, Kim M-S. Design and implementation of an SNMP-based traffic flooding attack
detection system. Springer: Challenges for Next Generation Network Operations and Service
Management. 2008; p. 380-9.

Pieterse H and Olivier M S (2012), Android Botnets on the Rise: Trends and Characteristics,
Retrieved from: http://icsa.cs.up.ac.za/issa/2012/Proceedings/Full/8_Paper.pdf

Pilli E. S, Joshi R.C, Niyogi R, Network forensic frameworks: Survey and research
challenges, Digital Investigation 7, 14-27, (2010).

142
Prabhjot Kaur, Anchit Bijalwan, RC Joshi, Amit Awasthi , (2017) Network Forensic Process
Model and Framework : An Alternative Scenario, (ICICCD – 2017)

Preda Mila Dalla, (2007) Code Obfuscation and Malware Detection by Abstract
Interpretation Universit`adegliStudi di Verona, Dipartimento di Informatica, TD-02-07,
2007.

Provos Niels, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and NagendraModadugu,


The Ghost In The Browser Analysis of Web-based Malware,
https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/provos/provos.pdf.

R. Ahmed, R. V. Dharaskar, Study of Mobile Botnets: An Analysis from the Perspective of


Efficient Generalized Forensics Framework for Mobile Devices, National Conference on
Innovative Paradigms in Engineering & Technology (NCIPET-2012).

R. Shirazi, Botnet Takedown Initiatives: A Taxonomy and Performance Model, Technology


Innovation Management Review, January 2015.

Rahimipour M and Jamali S (2014), A Survey on Botnets and Web-Based Botnet


Characteristics, International Journal of Computer Science Engineering and Technology, 4
(11), pp 282-286.

Rahman M Z A, Saudi M M and Basir N (2015), A Comprehensive Review of Mobile Botnet


Detection Using Genetic Algorithm: A Systematic Review, ARPN Journal of Engineering
and Applied Sciences, 10 (3).

Rajab M. A, J. Zarfoss, F. Monrose, and A. Terzis, A multifaceted approach to understanding


the botnet phenomenon. In Proceedings of the 6th Internet Measurement Conference, 2006.

Raman Singh, Harish Kumar, R.K. Singla, Review of Soft Computing in Malware Detection,
IP Multimedia Communications A Special Issue from IJCA - www.ijcaonline.org.

Rathod R P et al (2013) , A Critical Investigation of Botnet, Global Journal of Computer


Science and Technology Network, Web and Security, 13 (9).

143
Rehmani Rizwan, G.C. Hazarika and Gunadeep Chetia, Malware Threats and Mitigation
Strategies: A Survey, Journal of Theoretical and Applied Information Technology, Vol. 29
No.2, 2011. Retrieved on: March, 15, April, 2013.

Reith M, Carr C, Gunsch G. An Examination of Digital Forensic Models. International


Journal of Digital Evidence 1(3), (2002).

Ren W, Jin H, Distributed Agent-based Real Time Network Intrusion Forensics System
Architecture Design. Proceedings of the International Conference on Advanced Information
Networking and Applications, pp. 177-182, IEEE Press, New York (2005).

Rodriguez-Gomez R A et al (2013), Survey and Taxonomy of Botnet Research through


Lifecycle, ACM Computing Surveys, 45 (4).

Rui X, Wen-Li M, Wen-Ling Z, editors. Defending against UDP flooding by negative


selection algorithm based on eigenvalue sets, 2009 IAS‘09 Fifth International Conference on
Information Assurance and Security. IEEE, 2009.

Sajana T, Sheelarani CM, Narayana KV. A survey on clustering technique for big data
mining. Indian Journal of Science and Technology. 2016 January; 9(3).

Sauter M, (2013). Distributed denial of service actions and the challenge of civil
disobedience on the Internet. Citeseer.

Selamat S. R, Yusof R, Sahib S, Mapping Process of Digital Forensic Investigation


Framework. International Journal of Computer Science and Network Security 8, 163-169,
(2008).
Shahrestani A, Feily M, Ahmad R, & Ramadass S (2009). Architecture for applying data
mining and visualization on network flow for botnet traffic detection. In Computer
Technology and Development, 2009. ICCTD‘09. International Conference on (Vol. 1, pp.
33–37). IEEE.

Shanmugasundaram K, Memon N, Savant A, Bronnimann H, ―ForNet: A Distributed


Forensics Network‖, Digital Investigation 7, 14-27 (2010).
144
Sharma R and Deepshika (2014), Social Networking Sites: A New Platform for Botnets A
Short Case Study to prove that ,How Today's Social Networking is a New Platform for Cyber
Criminals, International Journal of Emerging Technology and Advanced Engineering, 4 (1).

Sharp Robin, An Introduction to Malware, Spring 2012. Retrieved on April, 10, 2013
http://orbit.dtu.dk/fedora/objects/orbit:82364/datastreams/file_4918204/content.

Sharp R, (2009). An Introduction to Malware. Spring.

Singh H and Bijalwan A (2016), A Survey on Malware, Botnets and their detection,
International Journal of Advanced Engineering Research and Science, 3 (3).

Singh K, Sangal S, Jain N, Traynor P, & Lee W (2010). Evaluating bluetooth as a medium
for botnet command and control. In International Conference on Detection of Intrusions and
Malware, and Vulnerability Assessment (pp. 61–80). Springer.

Stankovic Srdjan and DejanSimić , ―Defense Strategies Against Modern Botnets‖, (IJCSIS)
International Journal of Computer Scienceand Information Security, Vol. 2, No. 1, 2009.

Stevanovic M , Pedersen, J. M. (2013). Machine learning for identifying botnet network


traffic.

Stinson E, Mitchell J. C, (2008b). Towards Systematic Evaluation of the Evadability of


Bot/Botnet Detection Methods. WOOT, 8, 1–9.

Stinson E, Mitchell J. C, (2008a). Characterizing bots‘ remote control behavior. In Botnet


Detection (pp. 45–64). Springer.

Stolfo Salvatore J, Ke Wang, Wei-Jen Li. (2005) File analysis for malware detection,
HSARPA #0421001/H-SB04.2-002.WORMS 2005 Columbia IDS Lab June 19, 2005 2

Sultan M Shahid, ―Monitoring HTTP based Command and Control Botnets in Network
Traffic using Bot-Sniffer‖ , Diss. Texas A&M University-Corpus Christi, 2015.

Sung A. H, J. Xu, P. Chavez and S. Mukkamala, Static Analyzer of Vicious Executables


(SAVE), Proceedings of the 20th Annual Computer Security Applications Conference
(ACSAC‟04), IEEE.
145
Surajudeen Olawale, Adebayo, M.A. Mabayoje, Amit Mishra, OshoOluwafemi, Malware
Detection, Supportive Software Agents and Its Classification Schemes, International Journal
of Network Security & Its Applications (IJNSA), Vol.4, No.6, November 2012.

Survey on Automated Dynamic Malware Analysis Techniques and Tools,


http://www.seclab.tuwien.ac.at/papers/malware_survey.pdf.

T. Ormerod, Lingyu Wang, Mourad Debbabi, National Cyber-Forensics and Training


Alliance, CANADA.

Tang Y, Daniels T. E, A Simple Framework for Distributed Forensics, Proceedings of the


25th IEEE International Conference on Distributed Computing Systems Workshops, February
2005.
The Information Warfare Site. http://www.iwar.org.uk/

Tidke S and Karde P (2015), Smartphone based Botnet Attacks , International Journal of
Advanced Research in Computer Science and Software Engineering, 5 (4).

Tokhtabayev A G, & Skormin V A. (2007). Non-stationary Markov models and anomaly


propagation analysis in IDS. In Information Assurance and Security, 2007. IAS 2007. Third
International Symposium on (pp. 203–208). IEEE.

Torkashvan Milad, Haghighi Hassan. CBC2: A Cloud-based Botnet Command and Control.
Indian Journal of Science and Technology. 2015 Sep; 8(22).
Doi:10.17485/ijst/2015/v8i22/59773.

Tyagi A K and Aghila G (2011), A Wide Scale Survey on Botnet, International of Computer
Applications, 34 (9).

U. Wijesinghe, U. Tupakula, V. Varadharajan, An Enhanced Model for Network Flow Based


Botnet Detection , Proceedings of the 38th Australasian Computer Science Conference
(ACSC 2015), Sydney, Australia, 27 - 30 January 2015.

Vania J, Meniya A and Jethva H B (2013), ―A Review on Botnet and Detection Technique‖,
International Journal of Computer Trends and Technology, 4 (1).

146
Vinod P. V.Laxmi,M.S.Gaur, Survey on Malware Detection Methods, 3rd Hackers.
Workshop on Computer and Internet Security, Department of Computer Science and
Engineering, PrabhuGoel Research Centre for Computer &Internet Security,IIT, Kanpur, pp-
74-79, March,2009.

Virus Encyclopedia. http://www.viruslist.com/

W. Lu, M. Tavallaee and A. A. Ghorbani, Automatic Discovery of Botnet Communitieson


Large-Scale Communication Networks, University of New Brunswick Fredericton, NB E3B
5A3, Canada.

Wagner A, & Plattner B (2005). Entropy based worm and anomaly detection in fast IP
networks. In Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th
IEEE International Workshops on (pp. 172–177). IEEE.

Wahab A A (2016), Understanding and Defending Against Mobile Botnets: A Case Study,
Social Engineering Experiment via Social Media, Security, Vol-40.

Wang B, Li Z, Tu H, Hu Z, and Hu J (2009). Actively measuring bots in peer-to-peer


networks. In Networks Security, Wireless Communications and Trusted Computing, 2009.
NSWCTC‘09. International Conference on (Vol. 1, pp. 603–607). IEEE.

Wang K, Huang C, Tsai L, & Lin Y. (2014). Behavior‐based botnet detection in parallel.
Security and Communication Networks, 7(11), 1849–1859.

Wang S, Sun Q, Zou H, Yang F. Detecting SYN flooding attacks based on traffic prediction.
Security and Communication Networks. 2012;5(10):1131–40.

Wilson C (2008), Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy


Issues for Congress, Retrieved from: https://fas.org/sgp/crs/terror/RL32114.pdf

Xin H, Abhijit B Kang G. S. and Taejoon P. (2008) Behavioral detection of Malware


onMobile Handsets, June 17–20, 2008, Breckenridge, Colorado, USA. ACM 978-1- 60558-
139-2/08/06.

147
Xu L, Xu X, & Zhuo Y (2012). P2P Botnet Detection Using Min-Vertex Cover. Journal of
Networks, 7(8), 1177.

Yeshwantrao S A and Jadhav V J (2014), Threats of Botnet to Internet Security and


Respective Defense Strategies, International Journal of Emerging Technology and Advanced
Engineering, 4 (1).

You Ilsun and KangbinYim, Malware Obfuscation Techniques: A Brief Survey, International
Conference on Broadband, Wireless Computing, Communication and Applications, 2010.

Zang X, Tangpong A, Kesidis G, & Miller D. J (2011). Botnet detection through fine flow
classification. Unpublished, Departments of CS&E and EE, The Pennsylvania State University,
University Park, PA, Report No. CSE11-001.

148

You might also like