[1] Yu S,Guo S,Stojmenovic I.Can we beat legitimate cyber behavior mimicking attacks from botnets?[A].INFOCOM 2012[C].USA:IEEE,2012.2851-2855.
[2] Nadji Y,Antonakakis M,Perdisci R,et al.Beheading hydras:performing effective botnet takedowns[A].Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security[C].ACM,2013.121-132.
[3] Coskun B,Dietrich S,Memon N.Friends of an enemy:identifying local members of peer-to-peer botnets using mutual contacts[A].Proceedings of the 26th Annual Computer Security Applications Conference[C].ACM,2010.131-140.
[4] François J,Wang S,State R,et al.BotTrack:tracking botnets using NetFlow and PageRank[J].NETWORKING,2011,2011:1-14.
[5] Nagaraja S,Mittal P,Hong C Y,et al.BotGrep:Finding P2P Bots with Structured Graph Analysis[A].USENIX Security Symposium[C].ACM,2010.95-110.
[6] Brin S,Page L.The PageRank citation ranking:bringing order to the Web[R].Stanford Infolab,2006.
[7] Gkantsidis C,Mihail M,Saberi A.Random walks in peer-to-peer networks[A].INFOCOM 2004[C].IEEE,2004.1-12.
[8] Borisov N.Anonymous routing in structured peer-to-peer overlays[D].University of California,Berkeley,2005.
[9] Aspnes J,Wieder U.The expansion and mixing time of skip graphs with applications[A].Proceedings of the 17th Annual ACM Symposium on Parallelism in Algorithms and Architectures[C].ACM,2005.126-134.
[10] Zhong M,Shen K,Seiferas J.Non-uniform random membership management in peer-to-peer networks[A].INFOCOM 2005[C].IEEE,2005.1151-1161.
[11] Golovanov S,Soumenkov I.TDL4 top bot[R].Kaspersky Lab Analysis,2011.
[12] Neville A,Gibb R.Zeroaccess indepth[R].Symantec Security Response,2013.
[13] Stone-Gross B.The lifecycle of peer-to-peer (gameover) zeus[R].Dell Secure Works,2012.
[14] Kerkers M,Santanna J J,Sperotto A.Characterisation of the Kelihos.B Botnet[A].IFIP International Conference on Autonomous Infrastructure,Management and Security[C].Springer,2014.79-91.
[15] International Organization for Standardization (ISO) 3166-1[EB/OL].https://en.wikipedia.org/wiki/ISO_3166-1,2017-4-19.
[16] Ripeanu M.Peer-to-peer architecture case study:Gnutella network[A].Proceedings of First International Conference on Peer-to-Peer Computing[C].IEEE,2001.99-100.
[17] Leskovec J,Krevl A.SNAP Datasets:Stanford large network dataset collection (2014)[OL].http://snap.stanford.edu/data.
[18] Maymounkov P,Mazieres D.Kademlia:A peer-to-peer information system based on the xor metric[A].International Workshop on Peer-to-Peer Systems[C].Springer,2002.53-65.
[19] Montresor A,Jelasity M.PeerSim:A scalable P2P simulator[A].Ninth International Conference on Peer-to-Peer Computing 2009[C].IEEE,2009.99-100. |