A Survey of Botnet Technology and Defenses

被引:75
作者
Bailey, Michael [1 ]
Cooke, Evan [1 ]
Jahanian, Farnam [1 ]
Xu, Yunjing [1 ]
Karir, Manish [2 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
[2] Merit Network Inc, Ann Arbor, MI USA
来源
CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS | 2009年
基金
美国国家科学基金会;
关键词
D O I
10.1109/CATCH.2009.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Global Internet threats have undergone a profound transformation. from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world [6]. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today's networks intersect to inform the field of botnet technology and defense.
引用
收藏
页码:299 / +
页数:3
相关论文
共 30 条
  • [1] Akiyama M, 2007, P 2007 INT S APPL IN
  • [2] ANDERSON DS, 2007, P 16 USENIX SEC S SE
  • [3] [Anonymous], 1 WORKSH HOT TOP UND
  • [4] [Anonymous], P 13 NETW DISTR SYST
  • [5] [Anonymous], 1 WORKSH HOT TOP UND
  • [6] BINKLEY JR, 2006, P 2 C STEPS RED UNW
  • [7] BROADSKY A, 2007, 1 WORKSH HOT TOP UND
  • [8] Choi H., 2007, P 7 IEEE INT C COMP
  • [9] COOKE E, 2005, P STEPS RED UNW TRAF
  • [10] Dagon D., 2007, 23 ANN COMP SEC APPL