P2P as botnet command and control: a deeper insight

D Dittrich, S Dietrich - 2008 3rd International Conference on …, 2008 - ieeexplore.ieee.org
The research community is now focusing on the integration of peer-to-peer (P2P) concepts
as incremental improvements to distributed malicious software networks (now generically …

Peer to peer botnet detection using data mining scheme

WH Liao, CC Chang - 2010 international conference on internet …, 2010 - ieeexplore.ieee.org
Botnet was composed of the virus-infected computers severely threaten the security of
internet. Hackers, firstly, implanted virus in targeted computers, which were then …

Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts

B Coskun, S Dietrich, N Memon - … of the 26th Annual Computer Security …, 2010 - dl.acm.org
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it
may be possible to efficiently identify other members of the same botnet in the same network …

Infection spreading and source identification: A hide and seek game

W Luo, WP Tay, M Leng - IEEE Transactions on Signal …, 2016 - ieeexplore.ieee.org
The goal of an infection source node (eg, a rumor or computer virus source) in a network is
to spread its infection to as many nodes as possible, while remaining hidden from the …

Review of advanced monitoring mechanisms in peer-to-peer (p2p) botnets

WY Shen, S Manickam, MA Al-Shareeda - arxiv preprint arxiv:2207.12936, 2022 - arxiv.org
Internet security is getting less secure because of the existing of botnet threats. An attack
plan can only be planned out to take down the botnet after the monitoring activities to …

On advanced monitoring in resilient and unstructured P2P botnets

S Karuppayah, M Fischer, C Rossow… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
Botnets are a serious threat to Internet-based services and end users. The recent paradigm
shift from centralized to more sophisticated Peer-to-Peer (P2P)-based botnets introduces …

BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets

S Karuppayah, E Vasilomanolakis… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
The ever-growing number of cyber attacks from botnets has made them one of the biggest
threats on the Internet. Thus, it is crucial to study and analyze botnets, to take them down …

A brief review of advanced monitoring mechanisms in peer-to-peer (P2P) Botnets

MA Al-Shareeda, S Manickam… - 2022 8th …, 2022 - ieeexplore.ieee.org
Due to threats from botnets, internet security is becoming less safe. An attack plan can only
be planned out to take down the botnet after the monitoring activities to understand the …

DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network

Y Zhong, A Zhou, L Zhang, F **g, Z Zuo - PloS one, 2019 - journals.plos.org
As the root cause of illegal cyber activities, botnets are evolving continuously over the last
two decades. Current researches on botnet command and control mechanism based on …

[BOOK][B] An efficient approach to online bot detection based on a reinforcement learning technique

MM Alauthman - 2016 - search.proquest.com
In recent years, Botnets have been adopted as a popular method used to carry and spread
many malicious codes on the Internet. These codes pave the way to conducting many …