312 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author임을규-
dc.date.accessioned2018-04-16T04:33:37Z-
dc.date.available2018-04-16T04:33:37Z-
dc.date.issued2012-06-
dc.identifier.citationLecture Notes in Electrical Engineering, 2012, 120, P.589-593en_US
dc.identifier.issn1876-1100-
dc.identifier.urihttps://link.springer.com/chapter/10.1007%2F978-94-007-2911-7_56-
dc.identifier.urihttp://hdl.handle.net/20.500.11754/67865-
dc.description.abstractRecently cyber-attacks in Internet using botnets have been increased. Also, crimes involved in monetary profits through cyber-attacks have been continuously increased. Attackers can use P2P botnets to launch various attacks such as Distributed Denial of Service (DDoS), malware propagation, and so on. For this reason, P2P botnet detection techniques have been studied. This paper is a survey of P2P botnet detection, and describes about the general type of P2P botnets and detection methods.en_US
dc.language.isoenen_US
dc.publisherElsevier Science B.Ven_US
dc.subjectBotnet detectionen_US
dc.subjectP2P botneten_US
dc.titleA survey on P2P botnet detectionen_US
dc.typeArticleen_US
dc.relation.no0-
dc.relation.volume120 LNEE-
dc.identifier.doi10.1007/978-94-007-2911-7_56-
dc.relation.page589-593-
dc.relation.journalLecture Notes in Electrical Engineering-
dc.contributor.googleauthorHan, K.-S.-
dc.contributor.googleauthorIm, E.G.-
dc.relation.code2012315264-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentDEPARTMENT OF COMPUTER SCIENCE-
dc.identifier.pidimeg-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE(컴퓨터소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE