2014
DOI: 10.1109/surv.2013.091213.00134
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Botnet Behavior, Detection, and Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
133
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 156 publications
(143 citation statements)
references
References 53 publications
0
133
0
1
Order By: Relevance
“…Other early studies discussed and evaluated the scale and the takedown techniques of a botnet. Both Dagon et al [2] and Khattak et al [25] discussed how different kinds of botnets are organized and what activities they may have. Abu Rajab et al focused on botnet scale evaluation [1], and StoneGross et al addressed detailed issues of taking down a botnet [26].…”
Section: Related Workmentioning
confidence: 99%
“…Other early studies discussed and evaluated the scale and the takedown techniques of a botnet. Both Dagon et al [2] and Khattak et al [25] discussed how different kinds of botnets are organized and what activities they may have. Abu Rajab et al focused on botnet scale evaluation [1], and StoneGross et al addressed detailed issues of taking down a botnet [26].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have infiltrated botnets [12] and documented insider perspectives [48]. Readers interested in comprehensive surveys of the botnet phenomenon are directed to [49] [50].…”
Section: Prior Workmentioning
confidence: 99%
“…On the other hand, information about legal flux service is more genuine detailed. Consequently, a fast-flux attack holds the following poor quality (Al-Duwairi and Al-Hammouri, 2014; Celik & Oktug, 2013;Futai, Siyu, & Weixiong, 2013;Gržnić, Perhoč, Marić, Vlašić, & Kulcsar, 2014;Hao et al, 2011;Hsu, Huang, & Chen, 2010;Hsu et al, 2014, Huang, Mao, & Lee, 2010Khattak, Ramay, Khan, Syed, & Khayam, 2014;Lin, Lin, & Chiang, 2013;Mahjoub, 2013;Martinez-Bea, Castillo-Perez, & GarciaAlfaro, 2013;Paul, Tyagi, Manoj, & Thanudas, 2014;Shen, Wu, Yang, & Huang, 2013;Stalmans, Hunter, & Irwin, 2012;Wang, Mao, Wu, & Lee, 2012;Yadav, Reddy, Narasimha Reddy, & Ranjan, 2012):…”
Section: Characterizing Fast-flux Attackmentioning
confidence: 99%
“…As discussed in Celik and Oktug (2013), Hsu et al (2014), the ICANN Technique Report (2009), Khattak et al (2014), and Konte et al (2008Konte et al ( , 2009, there are kinds of fast-flux that can occur at different network locations. Formally modeling fast-flux attack can help us to investigate the features and behaviors of these flux attacks.…”
Section: Future Challenges 81 Modeling Fast-flux Attacksmentioning
confidence: 99%