A Review on Taxonomy of Botnet Detection

被引:0
作者
Panimalar, P. [1 ]
Rameshkumar, K. [1 ]
机构
[1] Bharathiar Univ, Res & Dev Ctr, Coimbatore 641046, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY (ICAET) | 2014年
关键词
Attacks; Botnet; Command and Control (C&C); Fuzzy Pattern Recognition-based Filtering (FPRF); Malware;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Malicious software, 'malware`, has acquired an important position in modern high-tech life. There are several malware like virus, worms, trojan horses, root kit forms regularly attacking the networks particularly on internet to steal the information. Apart from these threats botnet is one of the widespread and serious threats, which occurs commonly in today's cyber attacks. The botnet detection has been a major research topic in recent years. This paper clarifies about botnet phenomenon, some of the botnet detection and overview of an extensible fuzzy pattern recognition-based filtering algorithm for botnet detection.
引用
收藏
页数:4
相关论文
共 11 条
[1]  
AsSadhan B, 2009, GLOB TELECOMM CONF, P2157
[2]  
Bacher P., 2008, Know Your Enemy: Tracking Botnets (using honeynets to learn more about bots)
[3]   Botnet detection by monitoring group activities in DNS traffic [J].
Choi, Hyunsang ;
Lee, Hanwoo ;
Lee, Heejo ;
Kim, Hyogon .
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, :715-720
[4]  
Cooke E., 2005, P USENIX SRUTI WORKS, P39
[5]  
Feily Maryam, 2009, IEEE COMP SOC 3 INT
[6]  
Gu G., 2008, NETWORK DISTRIBUTED
[7]  
Kolbitsch C., 2009, USENIX Security, DOI DOI 10.1093/MP/SSQ045
[8]  
Livadas C, 2006, CONF LOCAL COMPUT NE, P967
[9]  
Naseem F., 2010, INT J VIDEO IMAGE PR, V10
[10]  
Plohmann D., 2011, Botnets: Detection, measurement, disinfection defence