Art
J-GLOBAL ID:201902249538700000   Reference number:19A1861436

Clustering Malicious DNS Queries for Blacklist-Based Detection

ブラックリストに基づく検出のための悪意のあるDNSクエリーのクラスタリング
Author (6):
Material:
Volume: E102.D  Issue:Page: 1404-1407(J-STAGE)  Publication year: 2019 
JST Material Number: U0469A  ISSN: 1745-1361  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Computer networks 
Reference (16):
  • [1] J.A. Lewis, “Economic impact of cybercrime - At $600 billion and counting-No slowing down,” https://www.csis.org/analysis/economic-impact-cybercrime, 2018.
  • [2] B. Rahbarinia, R. Perdisci, and M. Antonakakis, “Efficient and accurate behavior-based tracking of malware-control domains in large ISP networks,” ACM Trans. Privacy and Security, vol.19, no.2, pp.4:1-4:31, 2016. 10.1145/2960409
  • [3] N. Kheir, F. Tran, P. Caron, and N. Deschamps, “Mentor: Positive DNS reputation to skim-off benign domains in botnet C&C blacklists,” Proc. International Conference on ICT Systems Security and Privacy Protection, pp.1-14, 2014. 10.1007/978-3-642-55415-5_1
  • [4] M. Kührer, C. Rossow, and T. Holz, “Paint it black: Evaluating the effectiveness of malware blacklists,” Proc. International Symposium on Research in Attacks, Intrusions and Defenses, Lecture Notes in Computer Science, vol.8688, pp.1-21, Springer, Cham, 2014. 10.1007/978-3-319-11379-1_1
  • [5] T.-S. Wang, H.-T. Lin, W.-T. Cheng, and C.-Y. Chen, “DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis,” Computers & Security, vol.64, pp.1-15, 2017. 10.1016/j.cose.2016.10.001
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page