A Survey of Botnet and Botnet Detection

被引:182
作者
Feily, Maryam [1 ]
Shahrestani, Alireza [2 ]
Ramadass, Sureswaran [1 ]
机构
[1] Univ Sains Malaysia USM, IMPACT Res Team, Natl Adv lPv6 Ctr Excellence NAv6, George Town, Malaysia
[2] Univ Malaya, Fac Comp Sci & Informat Technol, IMPACT Res Team, NAv6, Kuala Lumpur, Malaysia
来源
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES | 2009年
关键词
Botnet; Botnet Detection; Cyber-security;
D O I
10.1109/SECURWARE.2009.48
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining characteristic of botnets is the use of command and control channels through which they can be updated and directed. Recently, botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention. This paper is a survey of botnet and botnet detection. The survey clarifies botnet phenomenon and discusses botnet detection techniques. This survey classifies botnet detection techniques into four classes: signature-based, anomaly-based, DNS-based, and mining-base. It summarizes botnet detection techniques in each class and provides a brief comparison of botnet detection techniques.
引用
收藏
页码:268 / +
页数:3
相关论文
共 33 条
[1]  
[Anonymous], P 1 WORKSH HOT TOP U
[2]  
[Anonymous], P 6 ACM SIGCOMM C IN
[3]  
[Anonymous], P 13 NETW DISTR SYST
[4]  
[Anonymous], 2006, DOMAIN NAME SERVICE
[5]  
Barford P., 2006, INSIDE LOOK BOTNETS
[6]  
Binkley JR, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 2ND WORKSHOP ON STEPS TO REDUCING UNWANTED TRAFFIC ON THE INTERNET, P43
[7]   Botnet detection by monitoring group activities in DNS traffic [J].
Choi, Hyunsang ;
Lee, Hanwoo ;
Lee, Heejo ;
Kim, Hyogon .
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, :715-720
[8]  
CHOO KKR, 2007, 333 AUSTR I CRIM
[9]  
Cooke E., 2005, P USENIX SRUTI WORKS, P39
[10]  
DAGON D, 2005, OARC WORKSH