1. M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A
  2. Survey of Botnet Technology and Defenses,” Ann Arbor,
  3. Michigan, 2009.
  4. Y. Ho Shin and E. Gyu Im, “A Survey of Botnet :
  5. Consequences, Defenses and Challenges,” pp. 133-791,
  6. P. Vaclav, “Information hiding and covert channel,” prague,
  7. Z. Wang and R. B. Lee, “New Constructive Approach to
  8. Covert Channel Modeling and Channel Capacity
  9. Estimation,” Springer, pp. 498-505, 2005.
  10. M. Smeets and M. Koot, “Covert Channels,” RP1,
  11. Amsterdam, 2006.
  12. S. Zander, “Performance of Selected Noisy Covert Channels
  13. and Their Countermeasures in IP Networks,” Swinburne
  14. University, Melbourne, 2010.
  15. D. Anthony, D. Johnson, P. Lutz, and B. Yuan, “A Behavior
  16. Based Covert Channel within Anti-Virus Updates,”
  17. Rochester, 2012.
  18. M. Saadati, “Simulation and Analysis of IPD-Reo Covert
  19. Timing Channels in Computer Networks,” Thesis, IHU,
  20. Tehran, 2014.
  21. W. C. Henry, “covert channels within IRC,” 2011.
  22. F. Brezo, J. Gaviria de la Puerta, I. Santos, D. Barroso, and
  23. P. G. Bringas, “C&C Techniques in Botnet Development,”
  24. Springer, vol. 189, no. 2194-5357, pp. 97-108, 2013.
  25. M. Casenove and A. Miraglia, “Botnet over Tor: The
  26. Illusion of Hiding,” in 6th International Conference on
  27. Cyber Conflict, 2014.
  28. D. Monica and C. Ribeiro, “Leveraging Honest Users:
  29. Stealth Command-and-Control of Botnets,” INESC-ID/IST,
  30. A. Nappa, A. Fattori, M. Balduzzi, M. Dell'Amico, and L.
  31. Cavallaro, “Take a Deep Breath: a Stealthy, Resilient and
  32. Cost-Effective Botnet Using Skype,” Springer, vol. 6201, no.
  33. -9743, pp. 81-100, 2010.
  34. M. Akiyama, T. Kawamoto, M. Shimamura, T. Yokoyama,
  35. Y. Kadobayashi, and S. Yamaguchi, “A proposal of metrics
  36. for botnet detection based on its cooperative behavior,”
  37. Takayama, 2005.
  38. H. Rouhani zeidanloo and A. Bt Abdul Manaf, “Botnet
  39. Detection by Monitoring Similar Communication Patterns,”
  40. IJCSIS, vol. 7, no. 1947-5500, pp. 36-46, 2010.
  41. R. Kannan and A. V. Ramani, “Flow Based Analysis to
  42. Identify Bonet Infected Systems,” JATIT, vol. 67, no. 1817-
  43. , pp. 290-296, 2014.
  44. L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C.
  45. Kruegel, “Disclosure: Detecting Botnet Command and
  46. Control Servers Through Large-Scale NetFlow Analysis,” in
  47. th annual computer security application conference, New
  48. York, USA, 2012.
  49. G. GU, R. Perdisci, J. Zhang, and W. Lee, “BotMiner:
  50. Clustring Analysis of Network Traffic for Protocol and
  51. Structure Independent Botnet DDetection,” In 17 USENIX
  52. Security Symosium, Berkeley, 2008.
  53. A. Berger and M. Hefeeda, “Exploiting SIP for Botnet
  54. Communication,” ftw, 2009.
  55. B. Francois, “BYOB: Build Your Own Botnet,” SANS,
  56. F. Conzetti, “A Historical evaluation of C&C complexity,”
  57. B. Thomas Golisano College, 2012.
  58. E. Stinson and J. C. Mitchell, “Towards Systematic
  59. Evaluation of the Evadability of Bot/Botnet Detection
  60. Methods,” 2008.
  61. K. Mahathi, “Botnets: Overview and Case Study,”
  62. Department of Mathematics and Computer Information
  63. Science, 2008.
  64. M. Dehghani and M. Saleh Esfahani, “Network Covert
  65. Channels: An Information Leakage Flow,” Passive Defence
  66. Quarterly, 2012.
  67. A. El-Atawy and E. Al-Shaer, “Building Covert Channels
  68. over the Packet Reordering Phenomenon,” In 28th Annual
  69. IEEE Conference on Computer Communications
  70. (INFOCOM), Chicago, USA, 2009.
  71. A. P. Jayasumana and A. A. Bare Nischal and M. Piratla,
  72. “Reorder density (rd): A formal, comprehensive metric for
  73. packet reordering,” NETWORKING, 2005.
  74. H. Sellke, C. Chun Wang, and S. Bagchi, “TCP/IP Timing
  75. Channels: Theory to Implementation,” in 28th Conference
  76. on Computer, West Lafayette, 2009.
  77. M. dehghani, M. saleh esfahani, “compound covert timing
  78. channel design and analysis with petrinet,” Advanced
  79. Defence Science and Technology, vol. 2, no. 5, pp. 157-169,
  80. S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia,
  81. “Model-based covert timing channels: Automated modeling
  82. and evasion,” in RAID 08: Proceedings of the 11th
  83. international symposium on Recent Advances in Intrusion
  84. Detection, Springer-Verlag, Berlin, Heidelberg, 2008.
  85. X. Zi, L. Yao, L. Pan, and J. Li, “Implementing a passive
  86. network covert timing channel,” Elsevier, no. 10.1016, pp.
  87. -696, Dec. 2009.
  88. H.Sellke, “Analytical charaterization of internet security
  89. attacks, thesis of phd,” Purdue University, West Lafayette,
  90. Indiana, 2010.
  91. S. Zander and G. Armitage, “CCHEF – Covert Channels
  92. Evaluation Framework Design and Implementation,”
  93. Melbourne, Australia, 2008.
  94. G. Liu, J. Zhai and Y. Dai, “Network covert timing channel
  95. with distribution matching,” Springer, no. DOI
  96. 1007/s11235-010-9368-1, pp. 199–205, 1 August 2010.
  97. L. Nussbaum and O. Richard, “A Comparative Study of
  98. Network Link Emulators,” LIG, 2006.
  99. S. Hemminger, “Network Emulation with NetEm,” Open
  100. Source Development Lab, April 2005.
  101. H. P. Pfeifer, “Network Emulation,” Protocol Labs, 2011.