Art
J-GLOBAL ID:201102258304451359   Reference number:11A0970722

A DNS-based Countermeasure Technology for Bot Worm-infected PC terminals in the Campus Network

キャンパスネットワークにおけるボットワームに感染したPC端末のためのDNSベース対応策技術
Author (5):
Material:
Issue: 10  Page: 39-46  Publication year: Sep. 21, 2006 
JST Material Number: L8082A  ISSN: 1343-2915  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (2):
JST classification
Category name(code) classified by JST.
Computer networks  ,  Data protection 
Reference (16):
  • Barford, P. and Yegneswaran, V., An Inside Look at Botnets, Special Workshop on Malware Detection, Advances in Information Security, Springer Verlag, 2006.
  • Nazario, J., Defense and Detection Strategies against Internet Worms, I Edition; Computer Security Series, Artech House, 2004.
  • (a) Kristoff, J., Botnets, detection and mitigation: DNS-based techniques, Northwestern University, 2005, http://www.it.northwestern.edu/-bin/docs/bots_kristoff_jul05.ppt. (b) Kristoff, J., Botnets, North American Network Operators Group (NANOG32), Reston, Virginia (2004), http://www.nanog.org/mtg-0410/kristoff.html
  • David, D., Zou, C., and Lee, W., Model Botnet Propagation Using Time Zones, Proceeding of the Network and Distributed System Security (NDSS) Symposium 2006; http://www.isoc.org/isoc/conferences/ndss/06/-proceedings/html/2006/
  • Schonewille, A. and v. Helmond, D. -J., The Domain Name Service as an IDS. How DNS can be used for detecting and monitoring badware in a network, 2006; http://staff.science.uva.nl/~delaat/snb-2005-2006/p12/report.pdf
more...
Terms in the title (5):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page