M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A
Survey of Botnet Technology and Defenses,” Ann Arbor,
Michigan, 2009.
Y. Ho Shin and E. Gyu Im, “A Survey of Botnet :
Consequences, Defenses and Challenges,” pp. 133-791,
P. Vaclav, “Information hiding and covert channel,” prague,
Z. Wang and R. B. Lee, “New Constructive Approach to
Covert Channel Modeling and Channel Capacity
Estimation,” Springer, pp. 498-505, 2005.
M. Smeets and M. Koot, “Covert Channels,” RP1,
Amsterdam, 2006.
S. Zander, “Performance of Selected Noisy Covert Channels
and Their Countermeasures in IP Networks,” Swinburne
University, Melbourne, 2010.
D. Anthony, D. Johnson, P. Lutz, and B. Yuan, “A Behavior
Based Covert Channel within Anti-Virus Updates,”
Rochester, 2012.
M. Saadati, “Simulation and Analysis of IPD-Reo Covert
Timing Channels in Computer Networks,” Thesis, IHU,
Tehran, 2014.
W. C. Henry, “covert channels within IRC,” 2011.
F. Brezo, J. Gaviria de la Puerta, I. Santos, D. Barroso, and
P. G. Bringas, “C&C Techniques in Botnet Development,”
Springer, vol. 189, no. 2194-5357, pp. 97-108, 2013.
M. Casenove and A. Miraglia, “Botnet over Tor: The
Illusion of Hiding,” in 6th International Conference on
Cyber Conflict, 2014.
D. Monica and C. Ribeiro, “Leveraging Honest Users:
Stealth Command-and-Control of Botnets,” INESC-ID/IST,
A. Nappa, A. Fattori, M. Balduzzi, M. Dell'Amico, and L.
Cavallaro, “Take a Deep Breath: a Stealthy, Resilient and
Cost-Effective Botnet Using Skype,” Springer, vol. 6201, no.
-9743, pp. 81-100, 2010.
M. Akiyama, T. Kawamoto, M. Shimamura, T. Yokoyama,
Y. Kadobayashi, and S. Yamaguchi, “A proposal of metrics
for botnet detection based on its cooperative behavior,”
Takayama, 2005.
H. Rouhani zeidanloo and A. Bt Abdul Manaf, “Botnet
Detection by Monitoring Similar Communication Patterns,”
IJCSIS, vol. 7, no. 1947-5500, pp. 36-46, 2010.
R. Kannan and A. V. Ramani, “Flow Based Analysis to
Identify Bonet Infected Systems,” JATIT, vol. 67, no. 1817-
, pp. 290-296, 2014.
L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C.
Kruegel, “Disclosure: Detecting Botnet Command and
Control Servers Through Large-Scale NetFlow Analysis,” in
th annual computer security application conference, New
York, USA, 2012.
G. GU, R. Perdisci, J. Zhang, and W. Lee, “BotMiner:
Clustring Analysis of Network Traffic for Protocol and
Structure Independent Botnet DDetection,” In 17 USENIX
Security Symosium, Berkeley, 2008.
A. Berger and M. Hefeeda, “Exploiting SIP for Botnet
Communication,” ftw, 2009.
B. Francois, “BYOB: Build Your Own Botnet,” SANS,
F. Conzetti, “A Historical evaluation of C&C complexity,”
B. Thomas Golisano College, 2012.
E. Stinson and J. C. Mitchell, “Towards Systematic
Evaluation of the Evadability of Bot/Botnet Detection
Methods,” 2008.
K. Mahathi, “Botnets: Overview and Case Study,”
Department of Mathematics and Computer Information
Science, 2008.
M. Dehghani and M. Saleh Esfahani, “Network Covert
Channels: An Information Leakage Flow,” Passive Defence
Quarterly, 2012.
A. El-Atawy and E. Al-Shaer, “Building Covert Channels
over the Packet Reordering Phenomenon,” In 28th Annual
IEEE Conference on Computer Communications
(INFOCOM), Chicago, USA, 2009.
A. P. Jayasumana and A. A. Bare Nischal and M. Piratla,
“Reorder density (rd): A formal, comprehensive metric for
packet reordering,” NETWORKING, 2005.
H. Sellke, C. Chun Wang, and S. Bagchi, “TCP/IP Timing
Channels: Theory to Implementation,” in 28th Conference
on Computer, West Lafayette, 2009.
M. dehghani, M. saleh esfahani, “compound covert timing
channel design and analysis with petrinet,” Advanced
Defence Science and Technology, vol. 2, no. 5, pp. 157-169,
S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia,
“Model-based covert timing channels: Automated modeling
and evasion,” in RAID 08: Proceedings of the 11th
international symposium on Recent Advances in Intrusion
Detection, Springer-Verlag, Berlin, Heidelberg, 2008.
X. Zi, L. Yao, L. Pan, and J. Li, “Implementing a passive
network covert timing channel,” Elsevier, no. 10.1016, pp.
-696, Dec. 2009.
H.Sellke, “Analytical charaterization of internet security
attacks, thesis of phd,” Purdue University, West Lafayette,
Indiana, 2010.
S. Zander and G. Armitage, “CCHEF – Covert Channels
Evaluation Framework Design and Implementation,”
Melbourne, Australia, 2008.
G. Liu, J. Zhai and Y. Dai, “Network covert timing channel
with distribution matching,” Springer, no. DOI
1007/s11235-010-9368-1, pp. 199–205, 1 August 2010.
L. Nussbaum and O. Richard, “A Comparative Study of
Network Link Emulators,” LIG, 2006.
S. Hemminger, “Network Emulation with NetEm,” Open
Source Development Lab, April 2005.
H. P. Pfeifer, “Network Emulation,” Protocol Labs, 2011.