2009 Eighth IEEE International Symposium on Network Computing and Applications 2009
DOI: 10.1109/nca.2009.56
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Botnets Using Command and Control Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 51 publications
(24 citation statements)
references
References 4 publications
0
23
0
1
Order By: Relevance
“…Traditionally, botnet detection and mitigation systems like BotSniffer [17] have focused on zombies that contact Internet Relay Chat(IRC) C&C servers or utilize IRC-style communication [9]. Unfortunately, botnets have grown in sophistication to use Peer-to-Peer (P2P) and unstructured communication [10,19].…”
Section: Related Workmentioning
confidence: 99%
“…Traditionally, botnet detection and mitigation systems like BotSniffer [17] have focused on zombies that contact Internet Relay Chat(IRC) C&C servers or utilize IRC-style communication [9]. Unfortunately, botnets have grown in sophistication to use Peer-to-Peer (P2P) and unstructured communication [10,19].…”
Section: Related Workmentioning
confidence: 99%
“…The primary purpose of botnets is for the controlling criminal, group of criminals or organized crime syndicate to use hijacked computers for fraudulent online activity. Experts believe that approximately 16-25% of the computers connected to the Internet are members of botnets [3], [4].…”
Section: Introductionmentioning
confidence: 99%
“…Experts believe that approximately 16-25% of the computers connected to the Internet are members of botnets [3] and [4]. Some reports indicate that approximately 80% of all email traffic is spam and that most of these messages are sent via botnets, such as the so called Grum, Cutwail and Rustock botnets [6].…”
Section: Introductionmentioning
confidence: 99%