Back to Results
First PageMeta Content
Spamming / Statistics / Botnets / Bots / Storm botnet / Internet bot / Cluster analysis / Storm Worm / Hierarchical clustering / Computer network security / Computing / Multi-agent systems


BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut
Add to Reading List

Document Date: 2008-07-14 18:18:35


Open Document

File Size: 415,09 KB

Share Result on Facebook

City

Atlanta / /

Company

Argus / Google / Damballa Inc. / Yahoo! / Cisco / /

Country

United States / /

/

Event

Natural Disaster / /

Facility

College of Computing / Georgia Institute of Technology / Judy library / /

IndustryTerm

backbone router / network routers / campus network / capture tool / normal network / real-time network traffic / normal application protocols / Open source solutions / clustering algorithms / Internet Relay Chat / Web drive-by download / Internet attacks / large networks / possible solutions / efficient network / communications patterns / binary using tools / internal and external networks / efficient algorithm / encrypted communications / speed networks / Web traffic / Internet security / specific search keys / search operations / application protocols / virtual network / Web-based C&C communications / normal applications / Web server / detection algorithms / peer communications / open-source intrusion detection tool / le sharing software / controlled virtual network / /

OperatingSystem

Unix / Linux / DoS / Windows XP / Microsoft Windows / /

Organization

USENIX Association / USENIX Association USENIX Association / Georgia Institute of Technology / College of Computing / /

Person

Ai / Roberto Perdisci / /

Position

representative / /

Product

BotMiner / IRC / BotMiner prototype system / BotMiner detection system / Davies-Bouldin (DB) / /

ProgrammingLanguage

Java / /

ProvinceOrState

Georgia / /

Technology

SNMP / backbone router / X-means clustering algorithm / two-step clustering algorithm / peer-to-peer / Linux / Unix / API / X-means algorithm / P2P / UDP / TCP/IP / application protocols / network protocol / efficient algorithm / C&C protocol / normal application protocols / DNS / Java / botnet C&C protocol / network routers / USENIX Association detection algorithms / HTTP / same protocol / same algorithm / edge router / Web server / /

URL

http /

SocialTag