skip to main content
10.1145/2179298.2179332acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Botnet traffic detection using hidden Markov models

Published:12 October 2011Publication History
First page image

References

  1. CIA Confirms Cyber Attack Caused Multi-City Power Outage. http://www.secureworks.com/research/ blog/research/21003/.Google ScholarGoogle Scholar
  2. Electricity Grid in U.S. Penetrated By Spies. http://online.wsj.com/article/ SB123914805204099085.html.Google ScholarGoogle Scholar
  3. Hackers Target Energy Industry. http://articles. latimes.com/2002/jul/08/science/sci-hackers8.Google ScholarGoogle Scholar
  4. Siemens: Stuxnet worm hit industrial systems. http://www.computerworld.com/s/article/print/ 9185419/Siemens_Stuxnet_worm_hit_industrial_ systems?taxonomyName=Network+ Security&taxonomyId=142.Google ScholarGoogle Scholar
  5. The risks to "SCADA" systems from Hackers. http://www.cip.ukcentre.com/security%202.htm.Google ScholarGoogle Scholar
  6. UAB computer forensics links internet postcards to virus. http://www.hindu.com/thehindu/holnus/ 008200907271321.htm.Google ScholarGoogle Scholar
  7. Zeus Tracker. https://zeustracker.abuse.ch.Google ScholarGoogle Scholar
  8. H. Bhanu. Timing Side-Channel Attacks On SSH. Master's thesis, Clemson University.Google ScholarGoogle Scholar
  9. R. Brooks, J. Schwier, and C. Griffin. Behavior detection using confidence intervals of hidden markov models. IEEE Trans. on Systems, Man, and Cybernetics, part B, 39(6):1484-1492, December 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. M. Craven. Traffic Analysis of Anonymity Systems. Master's thesis, Clemson University.Google ScholarGoogle Scholar
  11. Y. Lu, J. Schwier, R. Craven, R. Brooks, and C. Griffin. Inferring statistically significant hidden markov models. 2011.Google ScholarGoogle Scholar
  12. K. Pulasinghe, K. Watanabe, K. Izumi, and K. Kiguchi. Modular fuzzy-neuro controller driven by spoken language commands. IEEE Trans. on Systems, Man, and Cybernetics, part B, 34(1):293-302, Feburary 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. In Proceedings of the IEEE, volume 77, pages 257-286, Feburary 1989.Google ScholarGoogle ScholarCross RefCross Ref
  14. J. M. Schwier, R. R. Brooks, C. Griffin, and S. Bukkapatnam. Zero knowledge hidden markov model inference. Pattern Recognition Letters, 30(14):1273-1280, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Shalizi and J. Crutchfield. Computational Mechanics: Patterns and Prediction, Structure and Simplicity. Technical report, Santa Fe Institute, 2001.Google ScholarGoogle Scholar
  16. C. Shalizi, K. Shalizi, and J. Crutchfield. An algorithm for pattern discovery in time series. arXiv:cs.LG/0210025 v3, November 2002.Google ScholarGoogle Scholar
  17. B. K. Sin, J. Y. Ha, S. C. Oh, and J. H. Kim. Network-based approach to online cursive script recognition. IEEE Trans. on Systems, Man, and Cybernetics, part B, 29(2):321-328, April 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. T. Starner and A. Pentland. Visual recognition of american sign language using hidden markov models. Perceptual Computing Section, the Media Laboratory, Massachusetts Institute of Technology, Tech. Rep., 1995.Google ScholarGoogle Scholar
  19. Y. Wang, D. Ruan, J. Xu, M. Wen, and L. Deng. Computational intelligence algorithms analysis for smart grid cyber security. In Advances in Swarm Intelligence. SPRINGER. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. L. Wei, T. Mahbod, and A. A. Ghorbani. Automatic discovery of botnet communities on large-scale communication networks. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pages 1-10, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Wilson. Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress. CRS Report for Congress, 2009.Google ScholarGoogle Scholar
  1. Botnet traffic detection using hidden Markov models

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CSIIRW '11: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
      October 2011
      18 pages
      ISBN:9781450309455
      DOI:10.1145/2179298

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 October 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader