A Wide Survey on Botnet

被引:0
作者
Lashkari, Arash Habibi [1 ]
Ghalebandi, Seyedeh Ghazal [2 ]
Moradhaseli, Mohammad Reza [3 ]
机构
[1] Univ Technol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Malaya, Dept Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[3] UCTI, Ctr Technol & Innovat, Kuala Lumpur, Malaysia
来源
DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I | 2011年 / 166卷
关键词
Botnet; p2p Botnet; IRC botnet; HTTP botnet; Command and Control Models (C&C);
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are security threat now days, since they tend to perform serious internet attacks in vast area through the compromised group of infected machines. The presence of command and control mechanism in botnet structure makes them stronger than traditional attacks. Over course of the time botnet developer have switched to more advanced mechanism to evade each of which new detection methods and countermeasures. As our knowledge, existing survey on botnets area have just focused on determining different attributes of botnet behavior, hence this paper attempts to introduce botnet with a famous bot sample for defined behavior that provides obvious view on hornets and its feature. This paper is based on our two previous accepted papers of botnets on IEEE conferences namely ICCSIT 2011 and ICNCS 2010.
引用
收藏
页码:445 / +
页数:3
相关论文
共 30 条
[1]  
Akella A., 2010, UNDERSTANDING LARGE
[2]  
[Anonymous], 2008, Botsniffer: detecting botnet command and control channelsin network traffic'
[3]  
[Anonymous], 2007, BOTN NEW THREAT LAND
[4]  
Brodsky A., 2007, DISTRIBUTED CONTENT
[5]  
Cooke Evan., 2005, The Zombie Roundup Understanding, Detecting, and Disrupting Botnets
[6]  
Dagon D., 2008, TAXONOMY BOTNET STRU
[7]  
Daswani N., 2007, GOOGLE CLICK QUALITY
[8]  
DAVIS CR, 2008, SYBIL ATTACKS MITIGA
[9]  
Dittrich D, 2008, P2P BOTNET COMMAND C
[10]  
Dittrich David., 2008, DISCOVERY TECHNIQUES