Files
master_thesis/Thesis/bibliography.bib
2018-02-01 01:40:07 +01:00

545 lines
18 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
@misc{rfc1034,
added-at = {2013-12-17T09:42:01.000+0100},
author = {Mockapetris, Paul},
biburl = {http://www.bibsonomy.org/bibtex/2151af157c981c783982e48315896f65a/jullybobble},
interhash = {49594fc012a73e4d0d442e4f1da54b93},
intrahash = {151af157c981c783982e48315896f65a},
keywords = {imported phd},
timestamp = {2014-07-27T15:43:19.000+0200},
title = {{RFC 1034 Domain Names - Concepts and Facilities}},
url = {http://tools.ietf.org/html/rfc1035 http://tools.ietf.org/html/rfc1034},
year = 1987
}
@misc{rfc1035,
added-at = {2009-03-12T15:42:50.000+0100},
author = {Mockapetris, Paul},
biburl = {http://www.bibsonomy.org/bibtex/2998727e8b957ed6a37d3435c412d28b3/lillejul},
citeulike-article-id = {2443965},
interhash = {1a093b389624051dd83e998f48efaab7},
intrahash = {998727e8b957ed6a37d3435c412d28b3},
keywords = {internet protocol rfc},
month = {November},
organization = {Internet Engineering Task Force},
posted-at = {2008-02-28 15:36:27},
priority = {0},
timestamp = {2009-03-12T15:42:51.000+0100},
title = {RFC 1035 Domain Names - Implementation and Specification},
url = {http://tools.ietf.org/html/rfc1035},
year = 1987
}
@misc{rfc882,
series = {Request for Comments},
number = 882,
author = {Mockapetris, Paul},
howpublished = {RFC 882},
publisher = {RFC Editor},
doi = {10.17487/rfc882},
url = {https://rfc-editor.org/rfc/rfc882.txt},
title = {{Domain names: Concepts and facilities}},
pagetotal = 31,
year = 1983,
month = nov,
abstract = {This RFC introduces domain style names, their use for ARPA Internet mail and host address support, and the protocol and servers used to implement domain name facilities.},
}
@misc{rfc1995,
series = {Request for Comments},
number = 1995,
author = {Ohta, Masataka},
howpublished = {RFC 1995},
publisher = {RFC Editor},
doi = {10.17487/rfc1995},
url = {https://rfc-editor.org/rfc/rfc1995.txt},
title = {{Incremental Zone Transfer in DNS}},
pagetotal = 7,
year = 1996,
month = aug,
abstract = {This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.},
}
@misc{rfc2136,
added-at = {2009-11-15T15:37:34.000+0100},
author = {Vixie, P. and Thomson, S. and Rekhter, Y. and Bound, J.},
biburl = {https://www.bibsonomy.org/bibtex/2a2c7e5c6947748b7f5fc96dd0db9debe/henkellermann},
howpublished = {RFC 2136 (Proposed Standard)},
interhash = {beafcca10ed6b4136f6e20d367050f60},
intrahash = {a2c7e5c6947748b7f5fc96dd0db9debe},
keywords = {imported},
month = {April},
note = {Updated by RFCs 3007, 4035, 4033, 4034},
number = 2136,
organization = {Internet Engineering Task Force},
publisher = {IETF},
series = {Request for Comments},
timestamp = {2009-11-15T15:37:58.000+0100},
title = {{Dynamic Updates in the Domain Name System (DNS UPDATE)}},
url = {http://www.ietf.org/rfc/rfc2136.txt},
year = 1997
}
@inproceedings{Antonakakis:2010:BDR:1929820.1929844,
author = {Antonakakis, Manos and Perdisci, Roberto and Dagon, David and Lee, Wenke and Feamster, Nick},
title = {Building a Dynamic Reputation System for DNS},
booktitle = {Proceedings of the 19th USENIX Conference on Security},
series = {USENIX Security'10},
year = {2010},
isbn = {888-7-6666-5555-4},
location = {Washington, DC},
pages = {18--18},
numpages = {1},
url = {http://dl.acm.org/citation.cfm?id=1929820.1929844},
acmid = {1929844},
publisher = {USENIX Association},
address = {Berkeley, CA, USA},
}
@inproceedings{Bilge11exposure:finding,
author = {Leyla Bilge and Engin Kirda and Christopher Kruegel and Marco Balduzzi and Sophia Antipolis},
title = {Exposure: Finding malicious domains using passive dns analysis},
booktitle = {In Annual Network and Distributed System Security Symposium (NDSS},
year = {2011}
}
@article{Bilge:2014:EPD:2617317.2584679,
author = {Bilge, Leyla and Sen, Sevil and Balzarotti, Davide and Kirda, Engin and Kruegel, Christopher},
title = {Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains},
journal = {ACM Trans. Inf. Syst. Secur.},
issue_date = {April 2014},
volume = {16},
number = {4},
month = apr,
year = {2014},
issn = {1094-9224},
pages = {14:1--14:28},
articleno = {14},
numpages = {28},
url = {http://doi.acm.org/10.1145/2584679},
doi = {10.1145/2584679},
acmid = {2584679},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {Domain name system, machine learning, malicious domains},
}
@inproceedings{Antonakakis:2011:DMD:2028067.2028094,
author = {Antonakakis, Manos and Perdisci, Roberto and Lee, Wenke and Vasiloglou,II, Nikolaos and Dagon, David},
title = {Detecting Malware Domains at the Upper DNS Hierarchy},
booktitle = {Proceedings of the 20th USENIX Conference on Security},
series = {SEC'11},
year = {2011},
location = {San Francisco, CA},
pages = {27--27},
numpages = {1},
url = {http://dl.acm.org/citation.cfm?id=2028067.2028094},
acmid = {2028094},
publisher = {USENIX Association},
address = {Berkeley, CA, USA},
}
@misc{theguardiancom_wannacry,
author = {Nadia Khomami and Olivia Solon},
month = {May},
organization = {theguardian},
publisher = {theguardian},
title = {The Guardian - 'Accidental hero' halts ransomware attack and warns: this is not over},
year = 2017
}
@misc{googlecom_ipv6adoption,
author = {Google},
month = {January},
organization = {google.com},
publisher = {google.com},
title = {{Statistics IPv6 Adoption of Google users}},
url = {https://www.google.de/ipv6/statistics.html},
year = 2017
}
@misc{rp-2016-underground-hacker-marketplace-report,
author = {CTU},
month = {September},
organization = {DELL SecureWorks Counter Threat Unit},
publisher = {DELL CTU},
title = {{Secureworks - 2016 Underground Hacker Marketplace Report}},
year = 2016
}
@book{mockapetris1988development,
title={Development of the domain name system},
author={Mockapetris, Paul and Dunlap, Kevin J},
volume={18},
number={4},
year={1988},
publisher={ACM}
}
@misc{AlexaWebInformationOnline,
author={Amazon},
title={{Alexa. The web information company}},
month=nov,
year={2017},
howpublished={\url{http://www.alexa.com/}}
}
@misc{PhishtankInformationOnline,
author={openDNS},
title={{Fishtank - Join the fight against phishing}},
month=nov,
year={2017},
howpublished={\url{https://www.phishtank.com/}}
}
@misc{malwaredomainsInformationOnline,
author={DNS-BH-Project},
title={{Malware Prevention through Domain Blocking}},
month=nov,
year={2017},
howpublished={\url{http://www.malwaredomains.com}}
}
@misc{zeusblocklistInformationOnline,
author={Zeus Block List},
title={{ZeuS Tracker :: ZeuS blocklist}},
month=jan,
year={2018},
howpublished={\url{https://zeustracker.abuse.ch/blocklist.php}}
}
@misc{MCAfeeWebAdvisorOnline,
author={McAfee},
title={{McAfee WebAdvisor}},
month=jan,
year={2018},
howpublished={\url{https://home.mcafee.com/root/landingpage.aspx?lpname=get-it-now&affid=0&culture=de-ch}}
}
@misc{GoogleSafeBrowsingOnline,
author={Google},
title={{Google Safe Browsing}},
month=jan,
year={2018},
howpublished={\url{https://safebrowsing.google.com/}}
}
@misc{NortonSafeWebOnline,
author={Symantec},
title={{Norton Safe Web}},
month=jan,
year={2018},
howpublished={\url{https://safeweb.norton.com/}}
}
@misc{DNSWLOnline,
author={dnswl.org},
title={{E-Mail Reputation Protect against false positives}},
month=jan,
year={2018},
howpublished={\url{https://www.dnswl.org/}}
}
@misc{DIHEOnline,
author={ipindex.dihe.de/},
title={{dihe's IP-Index Browser}},
month=jan,
year={2018},
howpublished={\url{http://ipindex.dihe.de/}}
}
@misc{SIEOnline,
author={Farsight Security, Inc},
title={{Security Information Exchange (SIE)}},
month=dec,
year={2017},
howpublished={\url{https://www.farsightsecurity.com/solutions/security-information-exchange/}}
}
@misc{SBLOnline,
author={Spamhaus},
title={{The Spamhaus Block List}},
month=dec,
year={2017},
howpublished={\url{https://www.spamhaus.org/sbl/}}
}
@misc{CymruOnline,
author={Team Cymru},
title={{Team Cymru - IP TO ASN MAPPING}},
month=dec,
year={2017},
howpublished={\url{http://www.team-cymru.org/IP-ASN-mapping.html}}
}
@inproceedings{porras2009foray,
title={A Foray into Conficker's Logic and Rendezvous Points.},
author={Porras, Phillip A and Sa{\"\i}di, Hassen and Yegneswaran, Vinod},
booktitle={LEET},
year={2009}
}
@misc{TrendMicroOnline,
author={TREND MICRO},
title={{A Look at Locky Ransomwares Recent Spam Activities}},
month=jan,
year={2018},
howpublished={\url{https://blog.trendmicro.com/trendlabs-security-intelligence/look-locky-ransomwares-recent-spam-activities/}}
}
@misc{MariaDBOnline,
author={The MariaDB Foundation},
title={{MariaDB}},
month=jan,
year={2018},
howpublished={\url{https://mariadb.org/}}
}
@misc{MongoDBOnline,
author={MongoDB, Inc},
title={{MongoDB}},
month=jan,
year={2018},
howpublished={\url{https://www.mongodb.com}}
}
@misc{RedisOnline,
author={redislabs},
title={{Redis}},
month=jan,
year={2018},
howpublished={\url{https://redis.io/}}
}
@misc{SciKitOnline,
author={scikit-learn},
title={{scikit-learn - Decision Trees}},
month=jan,
year={2018},
howpublished={\url{http://scikit-learn.org/stable/modules/tree.html\#tree-algorithms-id3-c4-5-c5-0-and-cart}}
}
@misc{DENICOnline,
author={DENIC e.G.},
title={{DENIC}},
month=jan,
year={2018},
howpublished={\url{https://www.denic.de/}}
}
@misc{IANADNSClassesOnline,
author={IANA},
title={{Domain Name System (DNS) Parameters}},
month=jan,
year={2018},
howpublished={\url{https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml}}
}
@misc{WannaCryTwitterOnline,
author={Darien Huss},
title={WannaCry propagation payload contains previously unregistered domain},
month=jan,
year={2018},
howpublished={\url{https://twitter.com/darienhuss/status/863083680528576512}}
}
@misc{WhyDGOWinsOnline,
author={LITAL ASHER-DOTAN},
title={THE FBI VS. GAMEOVER ZEUS: WHY THE DGA-BASED BOTNET WINS},
month=dec,
year={2017},
howpublished={\url{https://www.cybereason.com/blog/the-fbi-vs-gameover-zeus-why-the-dga-based-botnet-wins}}
}
@misc{IDNOnline,
author={ICANN},
title={{Internationalized Domain Names}},
month=feb,
year={2012},
howpublished={\url{https://www.icann.org/resources/pages/idn-2012-02-25-en}}
}
@Article{Salzberg1994,
author="Salzberg, Steven L.",
title="C4.5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993",
journal="Machine Learning",
year="1994",
month="Sep",
day="01",
volume="16",
number="3",
pages="235--240",
issn="1573-0565",
doi="10.1007/BF00993309",
url="https://doi.org/10.1007/BF00993309"
}
@inproceedings{Stone-Gross:2009:YBM:1653662.1653738,
author = {Stone-Gross, Brett and Cova, Marco and Cavallaro, Lorenzo and Gilbert, Bob and Szydlowski, Martin and Kemmerer, Richard and Kruegel, Christopher and Vigna, Giovanni},
title = {Your Botnet is My Botnet: Analysis of a Botnet Takeover},
booktitle = {Proceedings of the 16th ACM Conference on Computer and Communications Security},
series = {CCS '09},
year = {2009},
isbn = {978-1-60558-894-0},
location = {Chicago, Illinois, USA},
pages = {635--647},
numpages = {13},
url = {http://doi.acm.org/10.1145/1653662.1653738},
doi = {10.1145/1653662.1653738},
acmid = {1653738},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {botnet, malware, measurement, security, torpig},
}
@techreport{RFC1033,
author = {M. Lottor},
title = {Domain administrators operations guide},
howpublished = {Internet Requests for Comments},
type = {RFC},
number = {1033},
year = {1987},
month = {November},
issn = {2070-1721},
publisher = {RFC Editor},
institution = {RFC Editor},
url = {http://www.rfc-editor.org/rfc/rfc1033.txt},
note = {\url{http://www.rfc-editor.org/rfc/rfc1033.txt}},
}
@InProceedings{10.1007/978-3-540-24668-8_15,
author="Wessels, Duane
and Fomenkov, Marina
and Brownlee, Nevil
and claffy, kc",
editor="Barakat, Chadi
and Pratt, Ian",
title="Measurements and Laboratory Simulations of the Upper DNS Hierarchy",
booktitle="Passive and Active Network Measurement",
year="2004",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="147--157",
abstract="Given that the global DNS system, especially at the higher root and top-levels, experiences significant query loads, we seek to answer the following questions: (1) How does the choice of DNS caching software for local resolvers affect query load at the higher levels? (2) How do DNS caching implementations spread the query load among a set of higher level DNS servers? To answer these questions we did case studies of workday DNS traffic at the University of California San Diego (USA), the University of Auckland (New Zealand), and the University of Colorado at Boulder (USA). We also tested various DNS caching implementations in fully controlled laboratory experiments. This paper presents the results of our analysis of real and simulated DNS traffic. We make recommendations to network administrators and software developers aimed at improving the overall DNS system.",
isbn="978-3-540-24668-8"
}
@inproceedings{Kohavi:1995:SCB:1643031.1643047,
author = {Kohavi, Ron},
title = {A Study of Cross-validation and Bootstrap for Accuracy Estimation and Model Selection},
booktitle = {Proceedings of the 14th International Joint Conference on Artificial Intelligence - Volume 2},
series = {IJCAI'95},
year = {1995},
isbn = {1-55860-363-8},
location = {Montreal, Quebec, Canada},
pages = {1137--1143},
numpages = {7},
url = {http://dl.acm.org/citation.cfm?id=1643031.1643047},
acmid = {1643047},
publisher = {Morgan Kaufmann Publishers Inc.},
address = {San Francisco, CA, USA},
}
@ARTICLE{Friedman98additivelogistic,
author = {Jerome Friedman and Trevor Hastie and Robert Tibshirani},
title = {Additive Logistic Regression: a Statistical View of Boosting},
journal = {Annals of Statistics},
year = {1998},
volume = {28},
pages = {2000}
}
@Article{Lim2000,
author="Lim, Tjen-Sien
and Loh, Wei-Yin
and Shih, Yu-Shan",
title="A Comparison of Prediction Accuracy, Complexity, and Training Time of Thirty-Three Old and New Classification Algorithms",
journal="Machine Learning",
year="2000",
month="Sep",
day="01",
volume="40",
number="3",
pages="203--228",
abstract="Twenty-two decision tree, nine statistical, and two neural network algorithms are compared on thirty-two datasets in terms of classification accuracy, training time, and (in the case of trees) number of leaves. Classification accuracy is measured by mean error rate and mean rank of error rate. Both criteria place a statistical, spline-based, algorithm called POLYCLSSS at the top, although it is not statistically significantly different from twenty other algorithms. Another statistical algorithm, logistic regression, is second with respect to the two accuracy criteria. The most accurate decision tree algorithm is QUEST with linear splits, which ranks fourth and fifth, respectively. Although spline-based statistical algorithms tend to have good accuracy, they also require relatively long training times. POLYCLASS, for example, is third last in terms of median training time. It often requires hours of training compared to seconds for other algorithms. The QUEST and logistic regression algorithms are substantially faster. Among decision tree algorithms with univariate splits, C4.5, IND-CART, and QUEST have the best combinations of error rate and speed. But C4.5 tends to produce trees with twice as many leaves as those from IND-CART and QUEST.",
issn="1573-0565",
doi="10.1023/A:1007608224229",
url="https://doi.org/10.1023/A:1007608224229"
}
@book{kernighan2006c,
title={The C programming language},
author={Kernighan, Brian W and Ritchie, Dennis M},
year={2006}
}
@inproceedings{Jung:2004:ESS:1028788.1028838,
author = {Jung, Jaeyeon and Sit, Emil},
title = {An Empirical Study of Spam Traffic and the Use of DNS Black Lists},
booktitle = {Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement},
series = {IMC '04},
year = {2004},
isbn = {1-58113-821-0},
location = {Taormina, Sicily, Italy},
pages = {370--375},
numpages = {6},
url = {http://doi.acm.org/10.1145/1028788.1028838},
doi = {10.1145/1028788.1028838},
acmid = {1028838},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {DNS black lists, Zipf-like distribution, spam traffic},
}
@INPROCEEDINGS{6151979,
author={P. J. Nero and B. Wardman and H. Copes and G. Warner},
booktitle={2011 eCrime Researchers Summit},
title={Phishing: Crime that pays},
year={2011},
volume={},
number={},
pages={1-10},
keywords={computer crime;computer forensics;financial data processing;unsolicited e-mail;cybercriminal;e-mail phishing;financial institution;forensic evidence;malicious Web site;phishing Web sites;Companies;Data mining;Education;Electronic mail;Interviews;Law enforcement;Security;Investigations;Justice Science;Phishing},
doi={10.1109/eCrime.2011.6151979},
ISSN={2159-1237},
month={Nov},}
@inproceedings{ramachandran2006can,
title={Can DNS-based blacklists keep up with bots?},
author={Ramachandran, Anirudh and Dagon, David and Feamster, Nick},
booktitle={CEAS},
year={2006},
organization={Citeseer}
}
@inproceedings{nazario2008net,
title={As the net churns: Fast-flux botnet observations},
author={Nazario, Jose and Holz, Thorsten},
booktitle={Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on},
pages={24--31},
year={2008},
organization={IEEE}
}
@inproceedings{Deri:2012:TPD:2245276.2245396,
author = {Deri, Luca and Trombacchi, Lorenzo Luconi and Martinelli, Maurizio and Vannozzi, Daniele},
title = {Towards a Passive DNS Monitoring System},
booktitle = {Proceedings of the 27th Annual ACM Symposium on Applied Computing},
series = {SAC '12},
year = {2012},
isbn = {978-1-4503-0857-1},
location = {Trento, Italy},
pages = {629--630},
numpages = {2},
url = {http://doi.acm.org/10.1145/2245276.2245396},
doi = {10.1145/2245276.2245396},
acmid = {2245396},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {domain name system, traffic measurement},
}