完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChen, Chia-Mei
dc.contributor.authorOu, Ya-Hui
dc.contributor.authorTsai, Yu-Chou
dc.date.accessioned2011-01-19T04:17:12Z
dc.date.accessioned2020-05-18T03:10:58Z-
dc.date.available2011-01-19T04:17:12Z
dc.date.available2020-05-18T03:10:58Z-
dc.date.issued2011-01-19T04:17:12Z
dc.date.submitted2011-01-10
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/29908-
dc.description.abstractBotnets are a combination of cyber attack, infection, and dissemination, and they become one of the most severe threats on the Internet. Cross the Internet, the infected host might launch any kind of attacks such as DDoS (Distributed Denial-of-Service) or Phishing. Comparing with botnets using other command-and-control (C&C) channels, web-based botnets are difficult to detect, because the C&C messages of web botnet are spread over HTTP protocol hiding behind normal flows. Most previous work tackles IRC-based botnet detection, while this study analyzes web botnet behaviors and develops a detection mechanism based on anomaly web flow traffic over an administrative network domain. Web bots exhibit routine and regular web connections which can be used to identify unusual web flow in a network. The experimental results show that the proposed approach can detect web botnets efficiently both in the simulated networks and a real campus network.
dc.description.sponsorshipNational Cheng Kung University,Tainan
dc.format.extent4p.
dc.relation.ispartofseries2010 ICS會議
dc.subjectBotnet
dc.subjectWeb-based Botnet
dc.subjectBotnet Detection
dc.subject.otherInformation Security
dc.titleWeb Botnet Detection Based on Flow Information
分類:2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站)

文件中的檔案:
沒有與此文件相關的檔案。


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。