2009
DOI: 10.1155/2009/692654
|View full text |Cite
|
Sign up to set email alerts
|

Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures

Abstract: Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
75
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 86 publications
(76 citation statements)
references
References 24 publications
1
75
0
Order By: Relevance
“…al. [6] in 2009 proposed the concept of Botnet and their formation and detection. The paper laid major emphasis on IRC and P2P based botnets.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…al. [6] in 2009 proposed the concept of Botnet and their formation and detection. The paper laid major emphasis on IRC and P2P based botnets.…”
Section: Related Workmentioning
confidence: 99%
“…Broadly there are two techniques for malware detection [6].  Anomaly based detection: Detecting viruses on the basis of abnormal behavior of the system.…”
Section: Fig1 Virus Detection Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…As we see in Figure 2, a botmaster and two C&C servers are controlled by a single botmaster acting as bots. The centralized structure has been used traditionally and, more recently, we see command and control botnets such as Proof-of-Concept (POC) Android botnet [48], AgoBot [22], SpyBot [2], GTBot [2], and SDBot [16]. Recent malware POC describes a proof of concept method that utilizes a short Messaging Service (SMS)…”
Section: Command and Controlmentioning
confidence: 99%