4Bacher P,Holz T, Kotter M, et al. Know Your Enemy: Tracking Botnets [ EB/OL ]. ( 2005-03-14 ). http:// www. honeynet, org/papers/bots.
5Gu Guofei, Porras P, Yegneswaran V, et al. BotHunter: Detecting Malware Infection Through IDS-driven Dialog Correlation[ C ]//Proceedings of the 16th Usenix Security Symposium. Berlin, Germany : Springer,2007 : 167-182.
6GoebelJ, Holz T. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation [ C ]//Proceedings of the 1st Conference on Hot Topics in Understanding Botnets. Berlin, Germany : Springer, 2007 : 1-8.
7Binkley J R,Singh S. An Algorithm for Anomaly-based Botnet Detection l C ]//Proceedings of USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop. Berlin, Germany : Springer, 2006 : 43-48.
8Wurzinger P, Bilge L, Holz T, et al. Automatically Generating Models for Botnet Detection [ C ]// Proceedings of the 14th European Symposium on Research in Computer Security. Saint-Malo, France: [ s. n. ] ,2009:232-249.
9Perdisci R,Lee W,Feamster N. Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces [ C ]//Proceedings of Con- ference on Networked System Design and Implement- ation. Berlin, Germany : Springer,2010 : 391-404.
10Giroire F, Chandrashekar J, Taft N, et al. Exploiting Tem- poral Persistence to Detect Covert Botuet Channels [ C ]// Proceedings of the 12th International Symposium on Book Subtitle. Saint-Malo, France: [ s. n. ] ,2009:326-345.