Blacklist-based malicious IP traffic detection

作者: Ibrahim Ghafir , Vaclav Prenosil

DOI: 10.1109/GCCT.2015.7342657

关键词:

摘要: … traffic for malicious IPs detection. The method was set up to create a log file of detected malicious … and passively analyzing the campus live traffic. The monitoring was performed for one …

参考文章(21)
G. Kirubavathi Venkatesh, R. Anitha Nadarajan, HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network international conference information security theory and practice. pp. 38- 48 ,(2012) , 10.1007/978-3-642-30955-7_5
Roberto Perdisci, David Dagon, Manos Antonakakis, Nick Feamster, Wenke Lee, Building a dynamic reputation system for DNS usenix security symposium. pp. 18- 18 ,(2010)
Roberto Perdisci, David Dagon, Manos Antonakakis, Nick Feamster, Wenke Lee, Notos: Building a Dynamic Reputation System for DNS ,(2010)
Mark Felegyhazi, Vern Paxson, Christian Kreibich, On the potential of proactive domain blacklisting usenix conference on large scale exploits and emergent threats. pp. 6- 6 ,(2010)
Vinod Yegneswaran, Guofei Gu, Wenke Lee, Martin Fong, Phillip Porras, BotHunter: detecting malware infection through IDS-driven dialog correlation usenix security symposium. pp. 12- ,(2007)
K. G. Anagnostakis, K. Xinidis, A. D. Keromytis, E. Markatos, S. Sidiroglou, P. Akritidis, Detecting targeted attacks using shadow honeypots usenix security symposium. pp. 9- 9 ,(2005) , 10.7916/D8WM1PS8
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Guofei Gu, Wenke Lee, Junjie Zhang, BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic network and distributed system security symposium. ,(2008)
Stuart Staniford, James A. Hoagland, Joseph M. McAlerney, Practical automated detection of stealthy portscans Journal of Computer Security. ,vol. 10, pp. 105- 136 ,(2002) , 10.3233/JCS-2002-101-205
Ryo Yamada, Shegeki Goto, Using abnormal TTL values to detect malicious IP packets Proceedings of the Asia-Pacific Advanced Network. ,vol. 34, pp. 27- 34 ,(2013) , 10.7125/APAN.34.4