Efficient Malicious Packet Capture Through Advanced DNS Sinkhole (original) (raw)
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
References
- Lim, C. T. (2008). Botnets trend technology and response. IT Standard and Test TTA Journal, 118, 58–65.
Google Scholar - Asri, S., & Pranggono, B. (2015). Impact of distributed denial-of-service attack on advanced metering infrastructure. Journal of Wireless Personal Communications, 83(3), 2211–2223.
Article Google Scholar - Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Journal of Wireless Personal Communications, 73(1), 95–126.
Article Google Scholar - Bailey, M., Cooke, E., Jahanian, F., Xu, Y., Karir, M. (2009). A survey of botnet technology and defenses. In Proceedings of Cybersecurity Applications and Technology Conference For Homeland Security (CATCH) (pp. 299–304).
- Kim, J., Kim, T. H., Lee, S. H., Park, Y. M., Song, J. H., Kang, T. H., & Lee B. Y. (2010). A study on trend, evolution and next-generation solutions of DDoS attacks. Reaserch Report. http://wwww.kisa.or.kr
- Kim, Y. B., & Youm, H. Y. (2008). A new bot disinfection method based on DNS Sinkhole. Journal of KIISC, 18(6A), 107–114.
Google Scholar - Kim, Y. B., Lee, Choi, J. S., & Youm, H. Y. (2009). Preventing botnet damage technique and it’s effect using bot DNS Sinkhole. Journal of KISS(C): Computing Practices, 15(1), 47–55.
Google Scholar - Choi, S.-S., Chun, M.-J., Lee, Y.-S., Lee, H.-R. (2010). A Practical methodology and framework for comprehensive incident handling focused on bot response. Future Generation Information Technology, Volume 6485 of the series Lecture Notes in Computer Science (pp. 481–492).
- Lee, H.-G., Choi, S.-S., Lee, Y.-S., & Park, H.-S. (2010). Enhanced Sinkhole system by improving post-processing mechanism. Future Generation Information Technology, Volume 6485 of the series Lecture Notes in Computer Science (pp. 469–480).
- Kim, K.-I., Choi, S.-S., Park, H.-S., Ko, S.-J., & Song, J.-S. (2014). A study on collection and analysis method of malicious URLs based on Darknet traffic for advanced security monitoring and response. Journal of KIISC, 24(6), 1185–1195.
Google Scholar - Kim, H.S., Choi, S.-S., & Song, J. (2013). A methodology for multipurpose DNS Sinkhole analyzing double bounce emails. In Proceedings Of ICONIC 2013, LNCS (vol. 8226, pp. 609–616).
- Yang, S., Luo, H., Qin, Y., & Zhang, H. (2009). Design and evaluation of DNS as location manager for HIP. Journal of Wireless Personal Communications, 48(4), 605–619.
Article Google Scholar - Saravanan, K., & Senthilkumar, A. (2015). Security enhancement in distributed networks using link-based mapping scheme for network intrusion detection with enhanced bloom filter. Journal of Wireless Personal Communications, 84(2), 821–839.
Article Google Scholar