Proceedings of the International Conference on Security and Cryptography 2011
DOI: 10.5220/0003522903070316
|View full text |Cite
|
Sign up to set email alerts
|

Botnet Detection Based on DNS Records and Active Probing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…This results in more A records and more distant NS records in DNS lookup. Moreover, fewer MX records are observed in malicious domains than in benign domains since domains associated with botnets attack usually have no or fewer MX records [15], [16].…”
Section: Dns-based Featuresmentioning
confidence: 99%
“…This results in more A records and more distant NS records in DNS lookup. Moreover, fewer MX records are observed in malicious domains than in benign domains since domains associated with botnets attack usually have no or fewer MX records [15], [16].…”
Section: Dns-based Featuresmentioning
confidence: 99%