- M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A
- Survey of Botnet Technology and Defenses,” Ann Arbor,
- Michigan, 2009.
- Y. Ho Shin and E. Gyu Im, “A Survey of Botnet :
- Consequences, Defenses and Challenges,” pp. 133-791,
- P. Vaclav, “Information hiding and covert channel,” prague,
- Z. Wang and R. B. Lee, “New Constructive Approach to
- Covert Channel Modeling and Channel Capacity
- Estimation,” Springer, pp. 498-505, 2005.
- M. Smeets and M. Koot, “Covert Channels,” RP1,
- Amsterdam, 2006.
- S. Zander, “Performance of Selected Noisy Covert Channels
- and Their Countermeasures in IP Networks,” Swinburne
- University, Melbourne, 2010.
- D. Anthony, D. Johnson, P. Lutz, and B. Yuan, “A Behavior
- Based Covert Channel within Anti-Virus Updates,”
- Rochester, 2012.
- M. Saadati, “Simulation and Analysis of IPD-Reo Covert
- Timing Channels in Computer Networks,” Thesis, IHU,
- Tehran, 2014.
- W. C. Henry, “covert channels within IRC,” 2011.
- F. Brezo, J. Gaviria de la Puerta, I. Santos, D. Barroso, and
- P. G. Bringas, “C&C Techniques in Botnet Development,”
- Springer, vol. 189, no. 2194-5357, pp. 97-108, 2013.
- M. Casenove and A. Miraglia, “Botnet over Tor: The
- Illusion of Hiding,” in 6th International Conference on
- Cyber Conflict, 2014.
- D. Monica and C. Ribeiro, “Leveraging Honest Users:
- Stealth Command-and-Control of Botnets,” INESC-ID/IST,
- A. Nappa, A. Fattori, M. Balduzzi, M. Dell'Amico, and L.
- Cavallaro, “Take a Deep Breath: a Stealthy, Resilient and
- Cost-Effective Botnet Using Skype,” Springer, vol. 6201, no.
- -9743, pp. 81-100, 2010.
- M. Akiyama, T. Kawamoto, M. Shimamura, T. Yokoyama,
- Y. Kadobayashi, and S. Yamaguchi, “A proposal of metrics
- for botnet detection based on its cooperative behavior,”
- Takayama, 2005.
- H. Rouhani zeidanloo and A. Bt Abdul Manaf, “Botnet
- Detection by Monitoring Similar Communication Patterns,”
- IJCSIS, vol. 7, no. 1947-5500, pp. 36-46, 2010.
- R. Kannan and A. V. Ramani, “Flow Based Analysis to
- Identify Bonet Infected Systems,” JATIT, vol. 67, no. 1817-
- , pp. 290-296, 2014.
- L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C.
- Kruegel, “Disclosure: Detecting Botnet Command and
- Control Servers Through Large-Scale NetFlow Analysis,” in
- th annual computer security application conference, New
- York, USA, 2012.
- G. GU, R. Perdisci, J. Zhang, and W. Lee, “BotMiner:
- Clustring Analysis of Network Traffic for Protocol and
- Structure Independent Botnet DDetection,” In 17 USENIX
- Security Symosium, Berkeley, 2008.
- A. Berger and M. Hefeeda, “Exploiting SIP for Botnet
- Communication,” ftw, 2009.
- B. Francois, “BYOB: Build Your Own Botnet,” SANS,
- F. Conzetti, “A Historical evaluation of C&C complexity,”
- B. Thomas Golisano College, 2012.
- E. Stinson and J. C. Mitchell, “Towards Systematic
- Evaluation of the Evadability of Bot/Botnet Detection
- Methods,” 2008.
- K. Mahathi, “Botnets: Overview and Case Study,”
- Department of Mathematics and Computer Information
- Science, 2008.
- M. Dehghani and M. Saleh Esfahani, “Network Covert
- Channels: An Information Leakage Flow,” Passive Defence
- Quarterly, 2012.
- A. El-Atawy and E. Al-Shaer, “Building Covert Channels
- over the Packet Reordering Phenomenon,” In 28th Annual
- IEEE Conference on Computer Communications
- (INFOCOM), Chicago, USA, 2009.
- A. P. Jayasumana and A. A. Bare Nischal and M. Piratla,
- “Reorder density (rd): A formal, comprehensive metric for
- packet reordering,” NETWORKING, 2005.
- H. Sellke, C. Chun Wang, and S. Bagchi, “TCP/IP Timing
- Channels: Theory to Implementation,” in 28th Conference
- on Computer, West Lafayette, 2009.
- M. dehghani, M. saleh esfahani, “compound covert timing
- channel design and analysis with petrinet,” Advanced
- Defence Science and Technology, vol. 2, no. 5, pp. 157-169,
- S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia,
- “Model-based covert timing channels: Automated modeling
- and evasion,” in RAID 08: Proceedings of the 11th
- international symposium on Recent Advances in Intrusion
- Detection, Springer-Verlag, Berlin, Heidelberg, 2008.
- X. Zi, L. Yao, L. Pan, and J. Li, “Implementing a passive
- network covert timing channel,” Elsevier, no. 10.1016, pp.
- -696, Dec. 2009.
- H.Sellke, “Analytical charaterization of internet security
- attacks, thesis of phd,” Purdue University, West Lafayette,
- Indiana, 2010.
- S. Zander and G. Armitage, “CCHEF – Covert Channels
- Evaluation Framework Design and Implementation,”
- Melbourne, Australia, 2008.
- G. Liu, J. Zhai and Y. Dai, “Network covert timing channel
- with distribution matching,” Springer, no. DOI
- 1007/s11235-010-9368-1, pp. 199–205, 1 August 2010.
- L. Nussbaum and O. Richard, “A Comparative Study of
- Network Link Emulators,” LIG, 2006.
- S. Hemminger, “Network Emulation with NetEm,” Open
- Source Development Lab, April 2005.
- H. P. Pfeifer, “Network Emulation,” Protocol Labs, 2011.
|