2023
DOI: 10.1145/3575808
|View full text |Cite
|
Sign up to set email alerts
|

Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey

Abstract: Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb marketplaces to promote and provide their services, which can vary from renting or buying a botnet (or parts of it), to hiring services (e.g. distributed denial of service attacks). At the same time, botnet takedown attempts have proven to be challenging, demanding a combination of technical and legal methods, and often requiring the collaboration of a plethora of entities with varying jurisdictions. In this article, we map the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0
2

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 46 publications
0
7
0
2
Order By: Relevance
“…Cybercriminals often use anonymous communication networks to conceal their identities and carry out online crimes. Dark web marketplaces are a type of hidden service on the dark web; the trading volume in these marketplaces has been increasing in recent years [5,6]. The anonymity of the dark web makes it difficult to track the identities of the buyers and sellers in these transactions.…”
Section: Introductionmentioning
confidence: 99%
“…Cybercriminals often use anonymous communication networks to conceal their identities and carry out online crimes. Dark web marketplaces are a type of hidden service on the dark web; the trading volume in these marketplaces has been increasing in recent years [5,6]. The anonymity of the dark web makes it difficult to track the identities of the buyers and sellers in these transactions.…”
Section: Introductionmentioning
confidence: 99%
“…Proposing a solution is challenging due to several hardships. First, botnet programs are typically designed to be stealthy, operating as quietly as possible to evade detection [Koroniotis et al, 2019;Li et al, 2019;Alomari et al, 2023;Georgoulias et al, 2023] . The reason behind this is the regular cycle of botnets creation: cybercriminals begin by building a network of bots without attracting attention, and once it is large enough for their purposes [Lourenço and Marinos, 2020;Padhiar et al, 2023] , they direct the bots to initiate a coordinated and massive attack, such as a DDoS targeting a server [Li et al, 2023] .…”
Section: Efficient Detection Of Botnet Malwarementioning
confidence: 99%
“…It could be argued that the destination IP could be a useful feature since all the bots could connect to the same server to get instructions. Nevertheless, these servers tend to rapidly change their IPs to evade reputation filtering [AlAhmadi and Martinovic, 2018;Georgoulias et al, 2023] . This sets up for us the problem of creating a detection sys-tem that didn't use the IPs as a feature, while also proving that our approach performed better than the IP-user-models from the literature.…”
Section: Efficient Detection Of Botnet Malwarementioning
confidence: 99%
See 2 more Smart Citations