8Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P. Roberts, and K. Han.Botnet research survey[C] in Proceedings of the 32nd Annual IEEE International Computer Software and Applications ConferenceWashington, DC, USA, 2008.
9M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multi-faceted approach to understanding the bomet phenomenon[C].ser. IMC'06. ACM, 2006.
10Staniford Chen, S. Heberlein, L.Holding Intruders Accountable on the lnternet[C].in Proceedings IEEE Symposium on Security and Privacy, OaHand, CA, USA, 1995.39-49.