2020
DOI: 10.4018/ijcac.2020070102
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing

Abstract: A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 71 publications
0
4
0
Order By: Relevance
“…It utilizes the steganographic techniques, which 'embed' the botnet code into a picture or a PDF document attached to an email that often mimics a colleague or friend. A new and unique form of botnets coming into play today are the Fast Flux Networks (FFNs) which promise high flexibility and availability (Al-Nawasrah et al, 2020). It keeps on changing the IP addresses of the domain names in order to avoid detection and prospective shutdown by intrusion detection systems.…”
Section: Botnet Functionsmentioning
confidence: 99%
“…It utilizes the steganographic techniques, which 'embed' the botnet code into a picture or a PDF document attached to an email that often mimics a colleague or friend. A new and unique form of botnets coming into play today are the Fast Flux Networks (FFNs) which promise high flexibility and availability (Al-Nawasrah et al, 2020). It keeps on changing the IP addresses of the domain names in order to avoid detection and prospective shutdown by intrusion detection systems.…”
Section: Botnet Functionsmentioning
confidence: 99%
“…However, the proposed approach is based on individual filtering. In order to detect the spoofed packets, researchers proposed many methods [ 36 ], but the main limitation of these methods is that they cannot detect a new type of attack, and their detection time and memory usage is high.…”
Section: Related Workmentioning
confidence: 99%
“…Botnets for example are used for launching attacks of distributed denial-of-service (DDoS). They are used for identifying thefts, sending spam and phishing emails (Ammar et al, 2018;Almomani et al, 2015Almomani et al, , 2013Almomani, 2018;Alieyan et al, 2018;Alauthaman et al, 2018;Alauthman et al, 2020;Alieyan et al, 2019;Al-Kasassbeh et al, 2020;Alauthman and Albesani, 2019;Al-Nawasrah et al, 2020). Fast flux networks (FFNs) serve as a kind of botnet.…”
Section: Introductionmentioning
confidence: 99%