2007
DOI: 10.1007/978-3-540-73614-1_6
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing Bots’ Remote Control Behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0
1

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 93 publications
(45 citation statements)
references
References 11 publications
0
44
0
1
Order By: Relevance
“…Moreover, the information collected from bots is used to discover the C&C system, unknown susceptibilities, techniques and tools used by the attacker, and the motivation of the attacker. A honeynet is used to collect bot-binaries which penetrate the botnets (Freiling et al, 2005;Abu Rajab et al, 2006;Stinson and Mitchell, 2007). There are different techniques to capture bots in honeynets (McCarty, 2003;Freiling et al, 2005;Abu Rajab et al, 2006;Dagon et al, 2006;Barford and Yegneswaran, 2007;Oberheide et al, 2007;Cremonini and Riccardi, 2009;Jing et al, 2009;Szymczyk, 2009;Rieck et al, 2010;Pham and Dacier, 2011).…”
Section: Taxonomy Of the Botnet Detection Phenomenonmentioning
confidence: 97%
See 3 more Smart Citations
“…Moreover, the information collected from bots is used to discover the C&C system, unknown susceptibilities, techniques and tools used by the attacker, and the motivation of the attacker. A honeynet is used to collect bot-binaries which penetrate the botnets (Freiling et al, 2005;Abu Rajab et al, 2006;Stinson and Mitchell, 2007). There are different techniques to capture bots in honeynets (McCarty, 2003;Freiling et al, 2005;Abu Rajab et al, 2006;Dagon et al, 2006;Barford and Yegneswaran, 2007;Oberheide et al, 2007;Cremonini and Riccardi, 2009;Jing et al, 2009;Szymczyk, 2009;Rieck et al, 2010;Pham and Dacier, 2011).…”
Section: Taxonomy Of the Botnet Detection Phenomenonmentioning
confidence: 97%
“…Botnet detection techniques are classified into two broad categories (Liu et al, 2008), IDSs and honeynets (Provos, 2004;Stinson and Mitchell, 2007). IDSs are further divided into anomaly-, signature-, and DNS-based IDSs (Stalmans and Irwin, 2011).…”
Section: Taxonomy Of the Botnet Detection Phenomenonmentioning
confidence: 99%
See 2 more Smart Citations
“…One of recent malware is bot, which is a computer program which allows its master to remotely control the infected machine/parts [19]. Such malware usually exploits software vulnerabilities or employ social engineering to spread themselves.…”
Section: Botmentioning
confidence: 99%