IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference 2008
DOI: 10.1109/glocom.2008.ecp.399
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 3 publications
0
1
0
Order By: Relevance
“…In [53], Takemori et al presented a system which monitors outbound packets from a host and compares with destinationbased whitelists. The whitelists are generated by observing an un-infected PC.…”
Section: ) Host-based Detectionmentioning
confidence: 99%
“…In [53], Takemori et al presented a system which monitors outbound packets from a host and compares with destinationbased whitelists. The whitelists are generated by observing an un-infected PC.…”
Section: ) Host-based Detectionmentioning
confidence: 99%
“…So proposed method of bandwidth assignment can work on both conditions when unintentionally DDoS type attack occur, when some server suddenly become popular and unexpected high number of users start browsing and using service of that servers or attacker intentionally attack on victim server by using its genuine IP, because if he/she use any fake IP or other fake identity method he/she will surely got caught cause in these days a number of methods are in use to prevent such type of DDoS attack as Wang H., Jin C., Shin K.G. [14] and Takemori Keisuke, Nishigaki Masakatsu [10] and Wang Shen, Guo Rui [23] suggests some methods.…”
Section: Bmentioning
confidence: 99%