Botnet detection techniques: review, future trends, and issues

被引:75
作者
Karim, Ahmad [1 ]
Bin Salleh, Rosli [1 ]
Shiraz, Muhammad [1 ]
Shah, Syed Adeel Ali [1 ]
Awan, Irfan [2 ]
Anuar, Nor Badrul [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] Univ Bradford, Dept Comp Sci, Bradford BD7 1DP, W Yorkshire, England
来源
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS | 2014年 / 15卷 / 11期
关键词
Botnet detection; Anomaly detection; Network security; Attack; Defense; Taxonomy; BEHAVIOR; COMMAND;
D O I
10.1631/jzus.C1300242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the Internet has enabled access to widespread remote services in the distributed computing environment; however, integrity of data transmission in the distributed computing platform is hindered by a number of security issues. For instance, the botnet phenomenon is a prominent threat to Internet security, including the threat of malicious codes. The botnet phenomenon supports a wide range of criminal activities, including distributed denial of service (DDoS) attacks, click fraud, phishing, malware distribution, spam emails, and building machines for illegitimate exchange of information/materials. Therefore, it is imperative to design and develop a robust mechanism for improving the botnet detection, analysis, and removal process. Currently, botnet detection techniques have been reviewed in different ways; however, such studies are limited in scope and lack discussions on the latest botnet detection techniques. This paper presents a comprehensive review of the latest state-of-the-art techniques for botnet detection and figures out the trends of previous and current research. It provides a thematic taxonomy for the classification of botnet detection techniques and highlights the implications and critical aspects by qualitatively analyzing such techniques. Related to our comprehensive review, we highlight future directions for improving the schemes that broadly span the entire botnet detection research field and identify the persistent and prominent research challenges that remain open.
引用
收藏
页码:943 / 983
页数:41
相关论文
共 212 条
[1]  
[Anonymous], SC MAGAZINE 0725
[2]  
[Anonymous], MICROSOFT FBI TRUMPE
[3]  
[Anonymous], LIT SURVEY RECENT BO
[4]  
[Anonymous], SPAM BOTNETS WATCH 2
[5]  
[Anonymous], DETECT REMOVE ROOTKI
[6]  
[Anonymous], 2008, BBC NEWS
[7]  
[Anonymous], TOP 10 SPAM BOTNETS
[8]  
[Anonymous], BOTNET SICS ZOMBIE S
[9]  
[Anonymous], DISCOVERED BOTNET CO
[10]  
[Anonymous], USENIX 4 CSET WORKSH