Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 임을규 | - |
dc.date.accessioned | 2018-04-16T04:33:37Z | - |
dc.date.available | 2018-04-16T04:33:37Z | - |
dc.date.issued | 2012-06 | - |
dc.identifier.citation | Lecture Notes in Electrical Engineering, 2012, 120, P.589-593 | en_US |
dc.identifier.issn | 1876-1100 | - |
dc.identifier.uri | https://link.springer.com/chapter/10.1007%2F978-94-007-2911-7_56 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11754/67865 | - |
dc.description.abstract | Recently cyber-attacks in Internet using botnets have been increased. Also, crimes involved in monetary profits through cyber-attacks have been continuously increased. Attackers can use P2P botnets to launch various attacks such as Distributed Denial of Service (DDoS), malware propagation, and so on. For this reason, P2P botnet detection techniques have been studied. This paper is a survey of P2P botnet detection, and describes about the general type of P2P botnets and detection methods. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier Science B.V | en_US |
dc.subject | Botnet detection | en_US |
dc.subject | P2P botnet | en_US |
dc.title | A survey on P2P botnet detection | en_US |
dc.type | Article | en_US |
dc.relation.no | 0 | - |
dc.relation.volume | 120 LNEE | - |
dc.identifier.doi | 10.1007/978-94-007-2911-7_56 | - |
dc.relation.page | 589-593 | - |
dc.relation.journal | Lecture Notes in Electrical Engineering | - |
dc.contributor.googleauthor | Han, K.-S. | - |
dc.contributor.googleauthor | Im, E.G. | - |
dc.relation.code | 2012315264 | - |
dc.sector.campus | S | - |
dc.sector.daehak | COLLEGE OF ENGINEERING[S] | - |
dc.sector.department | DEPARTMENT OF COMPUTER SCIENCE | - |
dc.identifier.pid | imeg | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.