Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

[PDF][PDF] 僵尸网络研究

诸葛建伟, 韩心慧, 周勇林, 叶志远, 邹维 - 2008 - jos.org.cn
僵尸网络是一种从传统恶意代码形态进化而来的新型攻击方式, 为攻击者提供了隐匿,
灵活且高效的一对多命令与控制机制, 可以控制大量僵尸主机实现信息窃取 …

[PDF][PDF] EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.

L Bilge, E Kirda, C Kruegel, M Balduzzi - Ndss, 2011 - sites.cs.ucsb.edu
The domain name service (DNS) plays an important role in the operation of the Internet,
providing a two-way mapping between domain names and their numerical identifiers. Given …

Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks

TF Yen, A Oprea, K Onarlioglu, T Leetham… - Proceedings of the 29th …, 2013 - dl.acm.org
As more and more Internet-based attacks arise, organizations are responding by deploying
an assortment of security products that generate situational intelligence in the form of logs …

[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection

G Gu, R Perdisci, J Zhang, W Lee - 2008 - usenix.org
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …

The crossfire attack

MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …

Your botnet is my botnet: analysis of a botnet takeover

B Stone-Gross, M Cova, L Cavallaro, B Gilbert… - Proceedings of the 16th …, 2009 - dl.acm.org
Botnets, networks of malware-infected machines that are controlled by an adversary, are the
root cause of a large number of security problems on the Internet. A particularly …

Disclosure: detecting botnet command and control servers through large-scale netflow analysis

L Bilge, D Balzarotti, W Robertson, E Kirda… - Proceedings of the 28th …, 2012 - dl.acm.org
Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of
research has focused on methods for detecting and mitigating the effects of botnets. Two of …

A survey of botnet and botnet detection

M Feily, A Shahrestani… - 2009 Third International …, 2009 - ieeexplore.ieee.org
Among the various forms of malware, botnets are emerging as the most serious threat
against cyber-security as they provide a distributed platform for several illegal activities such …