4McCarty B.Botnets:big and bigger[J].IEEE Security and Pri- vacy, 2003,1 (4) : 87-90.
5Purl R.Bots and Botnet:an overview[EB/OL].SANS White Paper ( 2003 ) .http ://www.sans.org/reading_room/whitepapers/malicious/ 1299.php.
6Bacher P, Holz T, Kotter M, et al.Know your enemy: tracking Botnets[EB/OL]. ( 2005 ) .http ://www.honeynet.org/papers/bots.
7Zhuge J W, Han X H, Ye Z Y, et al.Discover and track Botnets[C]//Proc of the Chinese Symp on Network and Information Security(NetSec 2005) ,2005 : 183-189.
8Arce I, Levy E.An analysis of the slapper worm[J].IEEE Security and Privacy, 2003 ( 1 ) :82-87.
9Rajab M A, Zarfoss J, Monrose F, et al.Amultifaceted approach to understanding the Botnet phenomenon[C]//Almeida J M, Almeida V A F, Barford P.Proc of the 6th ACM Internet Measurement Conf(IMC 2006).Rio de Janeriro:ACM Press, 2006:41-52.
10Binkley J R, Singh S.An algorithm for anomaly-based Botnet detection[C]//Proc of the USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Intemet(SRUTI 2006), 2006 : 43-48.