Mining Botnets and Their Evolution Patterns
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Jaehoon | - |
dc.contributor.author | Kang, Jaewoo | - |
dc.contributor.author | Lee, Jinseung | - |
dc.contributor.author | Song, Chihwan | - |
dc.contributor.author | Jin, Qingsong | - |
dc.contributor.author | Lee, Sunwon | - |
dc.contributor.author | Uh, Jinsun | - |
dc.date.accessioned | 2021-09-06T00:01:37Z | - |
dc.date.available | 2021-09-06T00:01:37Z | - |
dc.date.issued | 2013-07 | - |
dc.identifier.issn | 1000-9000 | - |
dc.identifier.issn | 1860-4749 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/102765 | - |
dc.description.abstract | The botnet is the network of compromised computers that have fallen under the control of hackers after being infected by malicious programs such as trojan viruses. The compromised machines are mobilized to perform various attacks including mass spamming, distributed denial of service (DDoS) and additional trojans. This is becoming one of the most serious threats to the Internet infrastructure at present. We introduce a method to uncover compromised machines and characterize their behaviors using large email logs. We report various spam campaign variants with different characteristics and introduce a statistical method to combine them. We also report the long-term evolution patterns of the spam campaigns. | - |
dc.format.extent | 11 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | SCIENCE PRESS | - |
dc.title | Mining Botnets and Their Evolution Patterns | - |
dc.type | Article | - |
dc.publisher.location | 중국 | - |
dc.identifier.doi | 10.1007/s11390-013-1361-1 | - |
dc.identifier.scopusid | 2-s2.0-84880049303 | - |
dc.identifier.wosid | 000321566800004 | - |
dc.identifier.bibliographicCitation | JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, v.28, no.4, pp 605 - 615 | - |
dc.citation.title | JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY | - |
dc.citation.volume | 28 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 605 | - |
dc.citation.endPage | 615 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordAuthor | botnet | - |
dc.subject.keywordAuthor | botnet evolution | - |
dc.subject.keywordAuthor | botnet spamming | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.