2008 32nd Annual IEEE International Computer Software and Applications Conference 2008
DOI: 10.1109/compsac.2008.205
|View full text |Cite
|
Sign up to set email alerts
|

Botnet Research Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0
6

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 120 publications
(50 citation statements)
references
References 3 publications
0
44
0
6
Order By: Relevance
“…Stressing the application code can reveal hidden functionality which can contain specific conditions that need to be met for malicious code to be executed. In addition, an application may have defenses [22] in place by making an attempt to detect its execution environment and consequently altering its behavior [14]. Countermeasures [15] also exist for when a program attempts to detect its execution environment.…”
Section: Introductionmentioning
confidence: 99%
“…Stressing the application code can reveal hidden functionality which can contain specific conditions that need to be met for malicious code to be executed. In addition, an application may have defenses [22] in place by making an attempt to detect its execution environment and consequently altering its behavior [14]. Countermeasures [15] also exist for when a program attempts to detect its execution environment.…”
Section: Introductionmentioning
confidence: 99%
“…IDS researchers assess the payload-based IDSs processing capability to lie between 100 Mbps and 200 Mbps when commodity hardware is used, and close to 1 Gbps when dedicated hardware is employed (Feily et al, 2009;Zhu et al, 2008). Famous tools like Snort and Bro consume high resource when they deal with huge amount of payload data of in today high speed networks.…”
Section: Analysis Based On Flow Datamentioning
confidence: 99%
“…There are two main approaches for botnet defense, the first one is analyzing the network traffic the second approach is using honeypots (Zhaosheng et al, 2008).…”
Section: P2p Botnet Detectionmentioning
confidence: 99%