Professional Documents
Culture Documents
15 Bibilography
15 Bibilography
B. Anchit and S. Harvinder, Investigation of UDP Bot Flooding Attack, Indian Journal of
Science and Technology, vol. 9, no. 21, 2016.
Baecher P, Koetter, M, Holz, T, Dornseif M, & Freiling F, (2006). The nepenthes platform:
An efficient approach to collect malware. In International Workshop on Recent Advances in
Intrusion Detection (pp. 165–184). Springer.
133
Bhatia S, Schmidt D, Mohay G, Tickle A. A framework for generating realistic traffic for
Distributed Denial-of-Service attacks and Flash Events. Computers & Security. 2014;40:95–
107.
Bijalwan A, Wazid M, Pilli ES, Joshi RC. Forensics of Random-UDP Flooding Attacks.
Journal of Networks. 2015;10(5):287–93.
Brodsky A, & Brodsky D, (2007). A Distributed Content Independent Method for Spam
Detection, HotBots, 7, 3.
C. Mazzariello ,University of Napoli Federico II, ―IRC traffic analysis for botnet detection‖,
The Fourth International Conference on Information Assurance and Security.
Casey E, ―Network traffic as a source of evidence: tool strengths, weakness, and future
needs‖ , Digital Investigation 1, 28-43 (2004).
134
Chen W, Yeung D-Y, editors. Defending against TCP SYN flooding attacks under different
types of IP spoofing, 2006 ICN/ICONS/MCL, International Conference on Networking,
Systems and Mobile Communications and Learning Technologies. IEEE, 2006.
Chen Y, Hwang K, editors. Spectral analysis of TCP flows for defense against reduction-of-
quality attacks, 2007 ICC‘07 IEEE International Conference on Communications.IEEE,2007.
Christodorescu M, Jha S, Seshia S.A, Song D and R.E.Bryant. (2005) Semantics- malware
detection, In Proceedings of the IEEE Symposium on Security and Privacy.
E. Stalmans, A Framework for DNS based detection and mitigation of malware infections on
a network, Security and Networks Research Group Department.
135
Elhadi Ammar Ahmed E, Mohd Aizaini Maarof and Ahmed Hamza Osman, Malware
Detection Based on Hybrid Signature Behaviour Application Programming Interface Call
Graph , American Journal of Applied Sciences 9 (3): 283-288, 2012.
Filiol E, Helenius M, Zanero S. Open problems in virology, J. Comput. Virol. 1 (3–4) (2006).
Goebel J, & Holz T, (2007). Rishi: Identify Bot Contaminated Hosts by IRC Nickname
Evaluation. HotBots, 7, 8.
136
Goodman N (2017), A Survey of Advances in Botnet Technologies, Retrieved from:
https://arxiv.org/pdf/1702.01132
Gupta BB, Joshi RC, Misra M. ANN Based Scheme to Predict Number of Zombies in a
DDoS Attack, IJ Network Security. 2012;14(2):61-70.
H. Singh and A. Bijalwan, A survey on Malware, Botnets and their detection, International
Journal of Advanced Engineering Research and Science (IJAERS), vol. 03, no. 03, 2016.
Hamad Fadi, Leonid Smalov and Anne James, Energy-aware Security in M-Commerce and
the Internet of Things, Iete Technical Review | Vol 26 | Issue 5 | Sep-Oct 2009, pp 357-362.
137
Honey net Project, Know your Enemy: Tracking Botnets, March 2005.
http://www.honeynet.org/papers/bots.
Hussain S M, Beigh GR, editors. Impact of DDoS attack (UDP Flooding) on queuing
models. 2013 4th International Conference on Computer and Communication Technology
(ICCCT). IEEE, 2013.
INFSO and EPoSS, Internet of Things in 2020: A Roadmap for the Future, Workshop
Report, EC INFSO and EPoSS, Belgium, 2008.
ITU, The Internet of Things, ITU Internet Reports 2005, Executive Summary, 2005
(available at: http://www.itu.int/osg/spu/
publications/internetofthings/InternetofThings_summary.pdf ).
Jacob B (2010), Experimental Host- and Network-based Analyser and Detector for Botnets,
Retrieved from: http://www.soc.napier.ac.uk/~bill/ben.pdf
Jonathan A.P. Marpaung, MangalSain and Hoon-Jae Lee, Survey on malware evasion
techniques: state of the art and challenges, International Conference of Advanced
Communication Technology, pp 19-22, 2012.
Joshi S, Khanna R and Joshi L K (2015), Android Botnet: An Upcoming Challenge, IOSR
Journal of Computer Engineering, pp 05-10.
K. Singh ,S. Chandra Guntuku , A. Thakur , C. Hota. Big Data Analytics framework for
Peer-to-Peer Botnet detection using Random Forests , Information Sciences 278 (2014)
Kaur N (2014), Review on Botnets: The Biggest Threat to the Cyber-Security, International
Journal of Computer Application, 4 (4).
138
Kim H, Kim B, Kim D, Kim I-K, Chung T-M. Implementation of GESNIC for web server
protection against HTTP GET flooding attacks, Springer: Information Security Applications.
2012; p. 285–95.
Kim Won n, Ok-RanJeong, Chulyun Kim and Jungmin So, The dark side of the Internet:
Attacks, costs and responses, Elsevier‗s Journal of Information Systems, Volume 36, Issue 3,
May 2011, pp 675-705.
Kohn M. D, Eloff M. M. Eloff J. H. P.: Integrated digital forensic process model. Computer
& Security 38, 103-115 (2013).
Kugisaki Y, Kasahara Y, Hori Y, & Sakurai K. (2007). Bot detection based on traffic
analysis. In Intelligent Pervasive Computing, 2007. IPC. The 2007 International Conference
on (pp. 303–306). IEEE.
L. Yeh, Y. Tsai. An Automated Framework for Command and Control Server Connection
and Malicious Mail Detection, ICNS 2015 The Eleventh International Conference on
Networking and Services.
Lee Y, & Lee Y, (2011). Detecting ddos attacks with hadoop. In Proceedings of The ACM
CoNEXT Student Workshop (p. 7). ACM.
139
Li M, Li J, Zhao W, editors. Simulation study of flood attacking of ddos. 2008 ICICSE‘08
International Conference on Internet Computing in Science and Engineering, IEEE, 2008.
Limarunothai R and Munlin M A (2015), Trends and Challenges of Botnet Architectures and
Detection Techniques. ,Journal of Information Science and Technology, 5 (1).
Liu C, Singhal A, Wijesekera D, (2015). A logic-based network forensic model for evidence
analysis, IFIP Advances in Information and Communication Technology 462, 129-145 .
Liu L, Chen S, Yan G, & Zhang, Z. (2008). Bottracer: Execution-based bot-like malware
detection. In International Conference on Information Security (pp. 97–113). Springer.
Liu Z, Feng D, (2005) Incremental fuzzy decision tree-based network forensic system.
Conference on Computational and Information Science 3802, 995-1002.
Lu Z, Wang W and Wang C (2014), How Can Botnets Cause Storms? Understanding the
Evolution and Impact of Mobile Botnets, IEEE.
M Cremonini and M Riccardi, The Dorothy Project: An Open Botnet Analysis Framework
for Automatic Tracking and Activity Visualization. , University of Milan Milano, Italy
M. Riccardi, D. Oro and J. Luna, A Framework For Financial Botnet Analysis, Barcelona
Digital Technology Centre Barcelona, Spain jluna@bdigital.org
Mahmoud M, Nir M and Matrawy A (2015), A Survey on Botnet Architecture, Detection and
Defences, International Journal of Network Security, 17 (3), pp 272-289.
140
Mandia K, Procise C, Incident Response and Computer Forensics, Osborne McGraw-Hill,
New York, (2003).
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H.
Witten. The weka data mining software: an update. SIGKDD Explor. Newsl,11(1):10–18,
2009.
Mathur Kirti, Saroj Hiranwal, A Survey on Techniques in Detection and Analyzing Malware
Executables, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 4, April 2013.
Matthew G. S, Eleazar Eskin, Erez Zadok& Salvatore J. S (2001) ―Data Mining Methods
forDetection of New Malicious Executables‖ 1081-601 1/01 $10.00 0 2001 IEEE.
McCarty B , (2003). Botnets: Big and bigger. IEEE Security & Privacy, 99(4), 87–90.
Midha K, Rajawat K and Rathore V S (2012), An Introduction to Botnet Attacks and Its
Solutions, International Journal of Computer Applications and Information Technology, 1
(2).
Mohay G, Ahmed E, Bhatia S, Nadarajan A, Ravindran B, Tickle AB, et al. Detection and
mitigation of high-rate flooding attacks. Springer:An Investigation into the Detection and
Mitigation of Denial of Service (DoS) Attacks. 2011; p. 131–81.
141
N. Paxton, G. Ahn, B. Chu, Towards Practical Framework for Collecting and Analyzing
Network-Centric Attacks, University of North Carolina at Charlotte.
Park J-S, Kim M-S. Design and implementation of an SNMP-based traffic flooding attack
detection system. Springer: Challenges for Next Generation Network Operations and Service
Management. 2008; p. 380-9.
Pieterse H and Olivier M S (2012), Android Botnets on the Rise: Trends and Characteristics,
Retrieved from: http://icsa.cs.up.ac.za/issa/2012/Proceedings/Full/8_Paper.pdf
Pilli E. S, Joshi R.C, Niyogi R, Network forensic frameworks: Survey and research
challenges, Digital Investigation 7, 14-27, (2010).
142
Prabhjot Kaur, Anchit Bijalwan, RC Joshi, Amit Awasthi , (2017) Network Forensic Process
Model and Framework : An Alternative Scenario, (ICICCD – 2017)
Preda Mila Dalla, (2007) Code Obfuscation and Malware Detection by Abstract
Interpretation Universit`adegliStudi di Verona, Dipartimento di Informatica, TD-02-07,
2007.
Raman Singh, Harish Kumar, R.K. Singla, Review of Soft Computing in Malware Detection,
IP Multimedia Communications A Special Issue from IJCA - www.ijcaonline.org.
143
Rehmani Rizwan, G.C. Hazarika and Gunadeep Chetia, Malware Threats and Mitigation
Strategies: A Survey, Journal of Theoretical and Applied Information Technology, Vol. 29
No.2, 2011. Retrieved on: March, 15, April, 2013.
Ren W, Jin H, Distributed Agent-based Real Time Network Intrusion Forensics System
Architecture Design. Proceedings of the International Conference on Advanced Information
Networking and Applications, pp. 177-182, IEEE Press, New York (2005).
Sajana T, Sheelarani CM, Narayana KV. A survey on clustering technique for big data
mining. Indian Journal of Science and Technology. 2016 January; 9(3).
Sauter M, (2013). Distributed denial of service actions and the challenge of civil
disobedience on the Internet. Citeseer.
Sharp Robin, An Introduction to Malware, Spring 2012. Retrieved on April, 10, 2013
http://orbit.dtu.dk/fedora/objects/orbit:82364/datastreams/file_4918204/content.
Singh H and Bijalwan A (2016), A Survey on Malware, Botnets and their detection,
International Journal of Advanced Engineering Research and Science, 3 (3).
Singh K, Sangal S, Jain N, Traynor P, & Lee W (2010). Evaluating bluetooth as a medium
for botnet command and control. In International Conference on Detection of Intrusions and
Malware, and Vulnerability Assessment (pp. 61–80). Springer.
Stankovic Srdjan and DejanSimić , ―Defense Strategies Against Modern Botnets‖, (IJCSIS)
International Journal of Computer Scienceand Information Security, Vol. 2, No. 1, 2009.
Stolfo Salvatore J, Ke Wang, Wei-Jen Li. (2005) File analysis for malware detection,
HSARPA #0421001/H-SB04.2-002.WORMS 2005 Columbia IDS Lab June 19, 2005 2
Sultan M Shahid, ―Monitoring HTTP based Command and Control Botnets in Network
Traffic using Bot-Sniffer‖ , Diss. Texas A&M University-Corpus Christi, 2015.
Tidke S and Karde P (2015), Smartphone based Botnet Attacks , International Journal of
Advanced Research in Computer Science and Software Engineering, 5 (4).
Torkashvan Milad, Haghighi Hassan. CBC2: A Cloud-based Botnet Command and Control.
Indian Journal of Science and Technology. 2015 Sep; 8(22).
Doi:10.17485/ijst/2015/v8i22/59773.
Tyagi A K and Aghila G (2011), A Wide Scale Survey on Botnet, International of Computer
Applications, 34 (9).
Vania J, Meniya A and Jethva H B (2013), ―A Review on Botnet and Detection Technique‖,
International Journal of Computer Trends and Technology, 4 (1).
146
Vinod P. V.Laxmi,M.S.Gaur, Survey on Malware Detection Methods, 3rd Hackers.
Workshop on Computer and Internet Security, Department of Computer Science and
Engineering, PrabhuGoel Research Centre for Computer &Internet Security,IIT, Kanpur, pp-
74-79, March,2009.
Wagner A, & Plattner B (2005). Entropy based worm and anomaly detection in fast IP
networks. In Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th
IEEE International Workshops on (pp. 172–177). IEEE.
Wahab A A (2016), Understanding and Defending Against Mobile Botnets: A Case Study,
Social Engineering Experiment via Social Media, Security, Vol-40.
Wang K, Huang C, Tsai L, & Lin Y. (2014). Behavior‐based botnet detection in parallel.
Security and Communication Networks, 7(11), 1849–1859.
Wang S, Sun Q, Zou H, Yang F. Detecting SYN flooding attacks based on traffic prediction.
Security and Communication Networks. 2012;5(10):1131–40.
147
Xu L, Xu X, & Zhuo Y (2012). P2P Botnet Detection Using Min-Vertex Cover. Journal of
Networks, 7(8), 1177.
You Ilsun and KangbinYim, Malware Obfuscation Techniques: A Brief Survey, International
Conference on Broadband, Wireless Computing, Communication and Applications, 2010.
Zang X, Tangpong A, Kesidis G, & Miller D. J (2011). Botnet detection through fine flow
classification. Unpublished, Departments of CS&E and EE, The Pennsylvania State University,
University Park, PA, Report No. CSE11-001.
148