1. Available https://en.wikipedia.org/wiki/Botnet
  2. J. Liu, et al., “Botnet: Classification, Attacks, Detection, Tracing.and Preventive Measures,” Journal on Wireless Communications and Networking, 2009.
  3. L. Heng-Feng and H. Ru-Xin, “A Survey of botnet Detection,” Computers & Security, 2010.
  4. M. Feily, A. Shahrestani, and S. Ramadass, “A Survey of Botnet and Botnet Detection,” 09 Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009.
  5. M. Feily, A. Shahrestani, and S. Ramadass, “A Survey of Botnet and Botnet Detection, IEEE 3rd Int. Conf. On Emerging Security Information, Systems and Technologies, 2009.
  6. J. Park, “Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods,” M. Sc Thesis, 2011.
  7. F. C. Freiling, T. Holz, and G. Wicherski, “Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks,” Springer Berlin Heidelberg, 2005.
  8. C. C. Zou and R. Cunningham, “Honeypot-aware advanced botnet construction and maintenance,” IEEE Int. Conf. on Dependable Systems and Networks, 2006.
  9. J. R. Binkley and S. Singh, “An Algorithm for Anomalybased botnet detection. Proc. USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop, 2006.
  10. S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and M. Ronaldo Salles, “Botnets: A survey, Computer Networks,” The International Journal of Computer and Telecommunications Networking, 2013.
  11. A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller, “An Overview of IP Flow-based Intrusion Detection,” IEEE Communications Surveys & Tutorial, 2010.
  12. D. Zhao, I. Traore, A. Ghorbani, B. Sayed, S. Saad, and W. Lu, “Peer to Peer Botnet Detection Based on Flow Intervals, Part of the IFIP Advances in Information and Communication Technology Book Series, 2012.
  13. S. Saad, I. Traore, A. Ghorbani, B. Sayed, D. Zhao, W. Lu, J. Felix, and P. Hakimian, “Detecting p2p Botnets Through Network Behavior Analysis and Machine Learning,” In Privacy, Security and Trust (PST), 2011 NinthAnnual International Conference on, july 2011.
  14. Snort IDS [Online] Retrieved on January 2013 from http://www.snort.org
  15. W. Wei, F. Binxing, et al., “A Novel Approach to Detect IRC-Based Botnet,” International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), 2009.
  16. R. Konrad, S. Guido, et al., “Botzilla: Detecting the "Phoning Home" Of Malicious Software,” Proceedings of the Symposium on Applied Computing, Sierre, Switzerland, ACM, 2010.
  17. E. Stinson and J. C. Mitchell, “Characterizing bots remote control behavior,” In: Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2007.
  18. G. Gu, P. Porras, V. Yegneswaran, et al., “Bothunter: Detecting Malware Infection Through IDS-driven Dialog Correlation,” Proc. 16th USENIX Security Symp., pp. 167-182, 2007.
  19. G. Gu, J. Zhang, and W. Lee, “A BotSniffer: detecting Botnet Command and Control Channels in Network Traffic,” Proc. 15th Annual Network and Distributed System Security Symp., pp. 2-19, 2008a.
  20. G. Gu, R. Perdisci, J. Zhang, et al., “BotMiner: Clustering Analysis of Network Traffic for Protocol and Structure-Independent Botnet Detection,” USENIX Security Symp., pp. 139-154, 2008b.
  21. W. T. Strayer, R. Walsh, C. Livadas, et al., “Detecting botnets with tight command and control,” Proc. 31st IEEE Conf. on Local Computer Networks, pp. 195-202, 2006.
  22. A. G. Tokhtabayev and V. A. Skormin, “Non-stationary Markov models and anomaly propagation analysis in IDS,” IEEE 3rd Int. Symp. on Information Assurance and Security, pp. 203-208, 2007. [doi:10.1109/IAS.2007.72]
  23. H. Choi, H. Lee, and H. Kim, “BotGAD: detecting botnets by Capturing Group Activities in Network Traffic,” Proc. 4th Int. ICST Conf. on Communication System Software and Middleware, pp. 1-8, 2009. [doi:10.1145/1621890.1621893]
  24. A. Shahrestani, M. Feily, R. Ahmad, et al., “Architecture for applying data mining and visualization on network flow for botnet traffic detection,” IEEE Int. Conf. on Computer Technology and Development, pp. 33-37, 2009.
  25. M. Masud, T. Al-khateeb, L. Khan, B. Thuraisingham, and K. Hamlen, “Flow-based Identification of Botnet Traffic by Mining Multiple log Files,” In Distributed Framework and Applications, DFmA 2008, First International Conference on, pp. 200 –206, Oct. 2008.
  26. L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel, “Disclosure: detecting botnet command and control servers through large-scale netflow analysis,” In Proceedings of the 28th Annual Computer Security Applications Conference, ser. ACSAC ’12, New York, NY, USA: ACM, pp. 129–138, 2012.
  27. R. Azmi, M. Gholinezhad, and M. Saberi, “Botnet Detection for Peer to Peer Networks,” Journal of Electronical & Cyber Defence, vol. 3, n o. 4, Serial No.12, 2016. (In Persian)
  28. M. Fathian, M. Abdollahi Azgomi, and H. Dehghani, “Modeling Browsing Behavior Analysis for Malicious Robot Detection in Distributed Denial of Service Attacks,” Journal of Electronical & Cyber Defence, vol. 4, no. 2, 2016, Serial no. 14 (In Persian)
  29. I. H. Witten and E. Frank, “Data Mining, 3th ed, SanFrancisco: Morgan Kafman, pp. 403-468, 2011.
  30. J. Han and M. Kamber, “Data Mining Concepts and Techniques,” SanFrancisco :Morgan Kafman, pp. 18-21, 2011.