2009 Third International Conference on Emerging Security Information, Systems and Technologies 2009
DOI: 10.1109/securware.2009.48
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Botnet and Botnet Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
172
0
3

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 282 publications
(175 citation statements)
references
References 14 publications
0
172
0
3
Order By: Relevance
“…Another pioneering research group in the field of botnet that implemented in real network scenarios is the Honeynet project [12]. However, honeynets are found to be mostly useful in understanding botnet technology and characteristics, but do not necessarily detect bot infection [13], [14].…”
Section: Related Workmentioning
confidence: 99%
“…Another pioneering research group in the field of botnet that implemented in real network scenarios is the Honeynet project [12]. However, honeynets are found to be mostly useful in understanding botnet technology and characteristics, but do not necessarily detect bot infection [13], [14].…”
Section: Related Workmentioning
confidence: 99%
“…Then he gives commands and controls the botnet infrastructures for his malicious purposes (Puri, 2003). (Feily, Shahrestani, & Ramadass, 2009) However the majority of botnet studies focus on IRC based C&C architecture, P2P based C&C architecture can spread easier and hide itself from intrusion detection techniques. In fact, using P2P networks to control victim hosts is not a novel technique.…”
Section: Classification Based On Candc Topologymentioning
confidence: 99%
“…They rarely affect the performance of host machine, so that they are very hard to be caught. Keylogger bots listen to the keyboard activities to gather such sensitive information like usernames, passwords, and identities (Feily et al, 2009). …”
Section: Botnet Attacksmentioning
confidence: 99%
“…The current work is based on results of three directions of research: analysis of botnets as a phenomenon occurred in the Internet [2,6,8,19,21], including the studies of botnet taxonometry, approaches of creation and improving the techniques for counteraction against modern botnets, and enhancement of concepts and methods for efficient modeling and simulation of botnet infrastructure and counteraction.…”
Section: Related Workmentioning
confidence: 99%
“…A group of researches, related to analysis of botnet as a network phenomenon, defines botnet lifecycle [6,21], which is consisting of several stages: initial infection and spreading stage, stage of 'stealth' operation and attack stage. Centralized [21] and decentralized [6,8,34] kinds of architectures are considered as results of investigation of feasible node roles, and different types of botnet arracks are described.…”
Section: Related Workmentioning
confidence: 99%