Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Jon Postel. ”Domain name system structure and delegation”. 1994.
    2. Florian Weimer.” Passive dns replication”. In FIRST Conference on Computer Security Incident, pp. 98, 2005.
    3. Roberto Perdisci, Igino Corona, and Giorgio Giacinto. ”Early detection of malicious flux networks via large-scale passive dns traffic analysis”.In IEEE Transactions on Dependable and Secure Computing, pp. 714726, IEEE, 2012.
    4. Bojan Zdrnja, Nevil Brownlee, and Duane Wessels.”Passive monitoring of dns anomalies” In Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 129139, Springer, 2007.
    5. David Plonka and Paul Barford. ”Context-aware clustering of dns query traffic”. In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, pages 217-230, ACM, 2008.
    6. Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi ”Exposure: Finding malicious domains using passive dns analysis”. In NDSS, 2011
    7. Felegyhazi, Mark and Kreibich, Christian and Paxson, Vern ”On the Potential of Proactive Domain Blacklisting ”.Proceedings of the 3rdUSENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, USENIX Association, 2010.
    8. M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. ”Building a Dynamic Reputation System for DNS”.In 19th Usenix Security Symposium, USENIX, 2010.
    9. E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi.” Fluxor: Detecting and monitoring fast-flux service networks”. In Detection of Intrusions and Malware, and Vunerability Assessment, 2008.
    10. R. Perdisci, I. Corona, D. Dagon, and W. Lee. ”Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces”. In 25th Annual Computer Security Applications Conference, ACSAC, 2009.
    11. Jalalzai, M.H. Shahid, W.B. ; Iqbal, M.M.W. ”DNS security challenges and best practices to deploy secure DNS with digital signatures.” In 12thInternational Bhurban Conference on Applied Sciences and Technology (IBCAST), 2015
    12. Sun Bin, Wen Qiaoyan, Liang Xiaoying . ”A DNS Based Anti Phishing Approach”. In IInd International Conference on Networks Security, Wireless Communications and Trusted Computing ,IEEE, 2010.
    13. Firenet.(October, 2008). DNS / nslookup - How to find the root servers ? Online. Available :https://www.fir3net.com/Networking/Protocols/dnsnslooku p-how-to-find-the-root-servers.html. ( December,2015)
    14. Infoblox. (October, 2015). Online. Available : http://cybersecuritysummit.co.uk/wpcontent/uploads/2015/1 0/Top-Ten-DNS-Attacks. (Accessed: December, 2015).
    15. Breiman, Leo. ”Random forests.” Machine learning 45.1 pages 5-32,2001.
    16. Nejad, Tayebeh Rouhani and Abadi, Mohammadebrahim Shiri Ahmad.”Intrusion detection in computer networks through a hybrid approach of data mining and decision trees.”2014.
    17. Chan, Jonathan Cheung-Wai and Paelinckx, Desire ”Evaluation of Random Forest and Adaboost tree-based ensemble classication and spectral band selection for ecotope mapping using airborne hyperspectral imagery.” Remote Sensing of Environment 112.6, pp. 2999-3011, 2008.
    18. Jaree Thongkam, Guandong Xu, and Yanchun Zhang. ”Adaboost algorithm withrandom forests for predicting breast cancer survivability. ”In International Joint Conference on Neural Networks (IJCNN), pp 3062- 3069,IEEE,2008.
    19. Thomas G Dietterich. ”An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization” Machine learning, 40(2):139-157, 2000.

Recent Article