2012
DOI: 10.1007/978-3-642-32498-7_47
|View full text |Cite
|
Sign up to set email alerts
|

A Collaborative Approach to Botnet Protection

Abstract: Abstract. Botnets are collections of compromised computers which have come under the control of a malicious person or organisation via malicious software stored on the computers, and which can then be used to interfere with, misuse, or deny access to a wide range of Internet-based services. With the current trend towards increasing use of the Internet to support activities related to banking, commerce, healthcare and public administration, it is vital to be able to detect and neutralise botnets, so that these … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 19 publications
(37 reference statements)
0
7
0
Order By: Relevance
“…However, BotMosaic [Houmansadr and Borisov 2012a] is impressive to interpolate network traffic and then track the bots by proliferation with collaboration. Wang and Gong [2009], Tseng et al [2011], and Stevanovic et al [2012] employ both approaches and largely focus on the collaboration to raise the accuracy of detection. As shown in Figure 2, host anomalies and network traffic (denoted as message 1 ) can be captured by the detection unit and sent to the collaboration unit for further detection.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, BotMosaic [Houmansadr and Borisov 2012a] is impressive to interpolate network traffic and then track the bots by proliferation with collaboration. Wang and Gong [2009], Tseng et al [2011], and Stevanovic et al [2012] employ both approaches and largely focus on the collaboration to raise the accuracy of detection. As shown in Figure 2, host anomalies and network traffic (denoted as message 1 ) can be captured by the detection unit and sent to the collaboration unit for further detection.…”
Section: Discussionmentioning
confidence: 99%
“…The central server will process, aggregate, and correlate these logs, and detect some potential attacks. In other literature [Wong 2006;Agarwal et al 2010;Oliner et al 2012;Stevanovic et al 2012], offline analysis is conducted while nodes are continuing their job without being blocked by the analysis results.…”
Section: Timeliness Of Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Nowadays, especially during the global COVID-19 pandemic, there is no longer a debate that the Internet has become a core element of our daily life. Today's Internet is about online presence, e-learning, social media, e-banking, work from home, online shopping, Internet of Things, and cloud computing (Stevanovic et al, 2012;Nozomi Networks Labs, 2020;Lallie et al, 2020). Unfortunately, Internet resources are continuously under threat by malicious actors, whether individual or organised entities.…”
Section: Introductionmentioning
confidence: 99%
“…Day by day the dependency on the Internet has increased in our daily lives, mainly in many important fields such as educational organizations, communication companies, government facilities, banking, and e-commerce. This adds many difficulties in managing the web and utilizing the application, for example, protecting the user data, integrity, privacy, and availability [1]. All these reasons changed the consideration of attackers to thinking about financial advantages, the attackers utilize diverse malware to accomplish their objectives.…”
Section: Introductionmentioning
confidence: 99%