Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

[PDF][PDF] 僵尸网络研究

诸葛建伟, 韩心慧, 周勇林, 叶志远, 邹维 - 2008 - jos.org.cn
僵尸网络是一种从传统恶意代码形态进化而来的新型攻击方式, 为攻击者提供了隐匿,
灵活且高效的一对多命令与控制机制, 可以控制大量僵尸主机实现信息窃取 …

Machine learning based botnet detection using real-time extracted traffic features

S Ranjan - US Patent 8,682,812, 2014 - Google Patents
(57) ABSTRACT A method for identifying a botnet in a network, including analyzing historical
network data using a pre-determined heuristic to determine values of a feature in the …

An efficient reinforcement learning-based Botnet detection approach

M Alauthman, N Aslam, M Al-Kasassbeh… - Journal of Network and …, 2020 - Elsevier
The use of bot malware and botnets as a tool to facilitate other malicious cyber activities (eg
distributed denial of service attacks, dissemination of malware and spam, and click fraud) …

[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection

G Gu, R Perdisci, J Zhang, W Lee - 2008 - usenix.org
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …

BotSniffer: Detecting botnet command and control channels in network traffic

G Gu, J Zhang, W Lee - 2008 - corescholar.libraries.wright.edu
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …

Disclosure: detecting botnet command and control servers through large-scale netflow analysis

L Bilge, D Balzarotti, W Robertson, E Kirda… - Proceedings of the 28th …, 2012 - dl.acm.org
Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of
research has focused on methods for detecting and mitigating the effects of botnets. Two of …

A survey of botnet and botnet detection

M Feily, A Shahrestani… - 2009 Third International …, 2009 - ieeexplore.ieee.org
Among the various forms of malware, botnets are emerging as the most serious threat
against cyber-security as they provide a distributed platform for several illegal activities such …

[HTML][HTML] Bothunter: Detecting malware infection through ids-driven dialog correlation.

G Gu, PA Porras, V Yegneswaran, MW Fong… - USENIX Security …, 2007 - usenix.org
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …