完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Chen, Chia-Mei | |
dc.contributor.author | Ou, Ya-Hui | |
dc.contributor.author | Tsai, Yu-Chou | |
dc.date.accessioned | 2011-01-19T04:17:12Z | |
dc.date.accessioned | 2020-05-18T03:10:58Z | - |
dc.date.available | 2011-01-19T04:17:12Z | |
dc.date.available | 2020-05-18T03:10:58Z | - |
dc.date.issued | 2011-01-19T04:17:12Z | |
dc.date.submitted | 2011-01-10 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/29908 | - |
dc.description.abstract | Botnets are a combination of cyber attack, infection, and dissemination, and they become one of the most severe threats on the Internet. Cross the Internet, the infected host might launch any kind of attacks such as DDoS (Distributed Denial-of-Service) or Phishing. Comparing with botnets using other command-and-control (C&C) channels, web-based botnets are difficult to detect, because the C&C messages of web botnet are spread over HTTP protocol hiding behind normal flows. Most previous work tackles IRC-based botnet detection, while this study analyzes web botnet behaviors and develops a detection mechanism based on anomaly web flow traffic over an administrative network domain. Web bots exhibit routine and regular web connections which can be used to identify unusual web flow in a network. The experimental results show that the proposed approach can detect web botnets efficiently both in the simulated networks and a real campus network. | |
dc.description.sponsorship | National Cheng Kung University,Tainan | |
dc.format.extent | 4p. | |
dc.relation.ispartofseries | 2010 ICS會議 | |
dc.subject | Botnet | |
dc.subject | Web-based Botnet | |
dc.subject | Botnet Detection | |
dc.subject.other | Information Security | |
dc.title | Web Botnet Detection Based on Flow Information | |
分類: | 2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站) |
文件中的檔案:
沒有與此文件相關的檔案。
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。