Rfc 1034: Domain names -concepts and facilities, 1987. ,
DOI : 10.17487/rfc1034
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.420.1013
Ozymandns : Kaminsky dns tunnel, 2005. ,
Passive dns replication, 2005. ,
The weka data mining software: An update, 2009. ,
A mathematical theory of communication, Bell system technical journal, vol.27, 1948. ,
Measuring and evaluating large-scale cdns paper withdrawn at mirosoft's request, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, ser. IMC '08, pp.15-29, 2008. ,
A k-means clustering algorithm, Applied Statistics, vol.28, 1979. ,
Detecting algorithimically generated malicious domain names, 2011. ,
DOI : 10.1145/1879141.1879148
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.1167
Detecting dns tunnels using character frequency analysis, p.4358, 2010. ,
Corrupted dns resolution paths: The rise of a malicious resolution authority ,
Visualizing the hosting patterns of modern cybercriminal, 2010. ,
Context-aware clustering of DNS query traffic, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08, pp.217-230, 2008. ,
DOI : 10.1145/1452520.1452547
Building a dynamic reputation system for dns, Proceedings of the 19th USENIX conference on Security, ser. USENIX Security'10, pp.18-18, 2010. ,
Passive Monitoring of DNS Anomalies, Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, ser. DIMVA '07, pp.129-139, 2007. ,
DOI : 10.1007/978-3-540-73614-1_8
Finding malicious domains using passive dns analysis, NDSS'11, 18th Annual Network & Distributed System Security Symposium, pp.6-9, 2011. ,
Security monitoring of dns traffic, 2006. ,
A Centralized Monitoring Infrastructure for Improving DNS Security, Proceedings of the 13th international conference on Recent advances in intrusion detection, ser. RAID'10, pp.18-37, 2010. ,
DOI : 10.1007/978-3-642-15512-3_2
Large scale dns traffic analysis of malicious internet activity with a focus on evaluating the response time of blocking phishing site, 2010. ,
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces, 2009 Annual Computer Security Applications Conference, pp.311-320, 2009. ,
DOI : 10.1109/ACSAC.2009.36
Dns anomaly detection EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis, 2011. ,