1MIRKOVIC J, REIHER P. A taxonomy of DDoS attack and DDoS denfence machanisims[ J]. ACM SIGCOMM Computer Communications Review, 2004, 34(2) : 2 -3.
2周勇林.僵尸网络的威胁和应对措施[R].国家计算机网络应急技术处理协调中心,2005.
3OIKARINEN J. IRC history by Jarkko Oikarinen[ EB/OL]. http://www. irc. org/history_docs/jarkko.html, 1998.
4The honeynet project & research alliance. Know your enemy: tracking botnets[EB/OL].http://project.hoceynet.org/papers/bots/, 2005 -03.
5PURI R. Bots & Botnet: an overview[ A]. GSEC practical Assignment Version 1.4b[ C].2003.6 -7.
6MCCARTY B. Botnets: big and bigger[J]. IEEE Security & Privacy, 2003, 1(4).
7DAGON D , ZOU C, LEE W. Modeling botnet propagation using time zones[ A]. 13th Annual Network and Distributed System Security Symposium (NDSS) [C].2006.