**Author details**

Liu Shangdong1,3,4 and Ji Yimu1,2,3,4,5\*

1 School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China

2 Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, Jiangsu, China

**References**

**26**(10):77-82

[1] Wu D, Cui X, Liu Q, Zhang F. Research on ubiquitous botnet. Netinfo

[2] Xi R, Yun X, Jing S, Jin S, Zhang Y. Research survey of network security situation awareness. Journal of

*Evaluation of Botnet Threats Based on Evidence Chain DOI: http://dx.doi.org/10.5772/intechopen.89564*

> International Conference on Networking and Services. 2009.

[10] Evesti A, Kanstren T, Frantti T, et al. Cybersecurity Situational Awareness Taxonomy. IEEE International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). London,

[11] Thomas C, Balakrishnan N. Modified evidence theory for

detection systems. In: Proc. International Conference on

performance enhancement of intrusion

Information Fusion (ICIF), Cologne

[13] Sabata B, Ornes C. Multisource Evidence Fusion for Cyber-Situation Assessment. 2006. pp. 624201-624201

[12] Yager RR, Fedrizzi M, Kacprzyk J, editors. Advances in the Dempster-Shafer Theory of Evidence. New York, NY: John Wiley and Sons; 1994

pp. 161-164

UK. 2017

Computer Applications. 2012;**32**(1):1-4

[4] Zhang S, Liu X, Sun X. Hierarchical awareness of network security situation based on multi-source fusion. Computer Technology and Development. 2016;

[5] Kokkonen T. Architecture for the cyber security situational awareness system. International Conference on Next Generation Wired/Wireless Networking. St. Petersburg, Russia:

[6] Eiseler V, Koch R, Rodosek GD. System complexity meets decision makers: A framework for level-

appropriate information processing. In: Bryant AR, Lopez J, Mills RF, editors. Proceedings of the 12th International Conference on Cyber Warfare and

Springer; 2016. pp. 294-302

Security. 2017. pp. 427-431

and Technology in Industry Applications. 2016. pp. 122-125

Grid. 2016;**7**(4):2026-2037

botnet size by using URL and collaborative MailServers. In: Fifth

**53**

[7] Yang Y-L. Research on network security situation awareness system based on machine learning. In: Zeng Z, Bai X, editors. Proceedings of the 2016 2nd Workshop on Advanced Research

[8] Khalid HM, Peng JCH. A Bayesian algorithm to enhance the resilience of WAMS applications against cyber attacks. IEEE Transactions on Smart

[9] Hu J, Li Z, Yao D, Yu J. Measuring

[3] Gong Z, Zhuo Y. Research on network situation awareness. Journal of

Software. 2010;**21**(7):1605-1619

Security. 2018;**2018**(07):16-28

3 Institute of High-Performance Computing and Bigdata, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China

4 Nanjing Center of HPC China, Nanjing, Jiangsu, China

5 Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing, Jiangsu, China

\*Address all correspondence to: jiym@njupt.edu.cn

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

*Evaluation of Botnet Threats Based on Evidence Chain DOI: http://dx.doi.org/10.5772/intechopen.89564*
