Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Botnet detection techniques: review, future trends, and issues

A Karim, RB Salleh, M Shiraz, SAA Shah… - Journal of Zhejiang …, 2014 - Springer
In recent years, the Internet has enabled access to widespread remote services in the
distributed computing environment; however, integrity of data transmission in the distributed …

BotSniffer: Detecting botnet command and control channels in network traffic

G Gu, J Zhang, W Lee - 2008 - corescholar.libraries.wright.edu
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arXiv preprint arXiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware

X Chen, J Andersen, ZM Mao, M Bailey… - … systems and networks …, 2008 - ieeexplore.ieee.org
Many threats that plague today's networks (eg, phishing, botnets, denial of service attacks)
are enabled by a complex ecosystem of attack programs commonly called malware. To …

An advanced hybrid peer-to-peer botnet

P Wang, S Sparks, CC Zou - IEEE Transactions on Dependable …, 2008 - ieeexplore.ieee.org
A “botnet” consists of a network of compromised computers controlled by an attacker
(“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be …

The dropper effect: Insights into malware distribution with downloader graph analytics

BJ Kwon, J Mondal, J Jang, L Bilge… - Proceedings of the 22nd …, 2015 - dl.acm.org
Malware remains an important security threat, as miscreants continue to deliver a variety of
malicious programs to hosts around the world. At the heart of all the malware delivery …

A taxonomy of botnet structures

D Dagon, G Gu, CP Lee, W Lee - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We
propose key metrics to measure their utility for various activities (eg, spam, ddos). Using …

[PDF][PDF] My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging

M Fabian, MA Terzis - Proceedings of the 1st USENIX Workshop on Hot …, 2007 - usenix.org
As if fueled by its own fire, curiosity and speculation regarding botnet sizes abounds. Among
researchers, in the press, and in the classroom—the questions regarding the widespread …

[PDF][PDF] Botnet: classification, attacks, detection, tracing, and preventive measures

J Liu, Y Xiao, K Ghaboosi, H Deng, J Zhang - EURASIP journal on wireless …, 2009 - Springer
Botnets become widespread in wired and wireless networks, whereas the relevant research
is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss …