P2P as botnet command and control: a deeper insight
The research community is now focusing on the integration of peer-to-peer (P2P) concepts
as incremental improvements to distributed malicious software networks (now generically …
as incremental improvements to distributed malicious software networks (now generically …
Peer to peer botnet detection using data mining scheme
WH Liao, CC Chang - 2010 international conference on internet …, 2010 - ieeexplore.ieee.org
Botnet was composed of the virus-infected computers severely threaten the security of
internet. Hackers, firstly, implanted virus in targeted computers, which were then …
internet. Hackers, firstly, implanted virus in targeted computers, which were then …
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it
may be possible to efficiently identify other members of the same botnet in the same network …
may be possible to efficiently identify other members of the same botnet in the same network …
Infection spreading and source identification: A hide and seek game
The goal of an infection source node (eg, a rumor or computer virus source) in a network is
to spread its infection to as many nodes as possible, while remaining hidden from the …
to spread its infection to as many nodes as possible, while remaining hidden from the …
Review of advanced monitoring mechanisms in peer-to-peer (p2p) botnets
WY Shen, S Manickam, MA Al-Shareeda - arxiv preprint arxiv:2207.12936, 2022 - arxiv.org
Internet security is getting less secure because of the existing of botnet threats. An attack
plan can only be planned out to take down the botnet after the monitoring activities to …
plan can only be planned out to take down the botnet after the monitoring activities to …
On advanced monitoring in resilient and unstructured P2P botnets
Botnets are a serious threat to Internet-based services and end users. The recent paradigm
shift from centralized to more sophisticated Peer-to-Peer (P2P)-based botnets introduces …
shift from centralized to more sophisticated Peer-to-Peer (P2P)-based botnets introduces …
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets
The ever-growing number of cyber attacks from botnets has made them one of the biggest
threats on the Internet. Thus, it is crucial to study and analyze botnets, to take them down …
threats on the Internet. Thus, it is crucial to study and analyze botnets, to take them down …
A brief review of advanced monitoring mechanisms in peer-to-peer (P2P) Botnets
MA Al-Shareeda, S Manickam… - 2022 8th …, 2022 - ieeexplore.ieee.org
Due to threats from botnets, internet security is becoming less safe. An attack plan can only
be planned out to take down the botnet after the monitoring activities to understand the …
be planned out to take down the botnet after the monitoring activities to understand the …
DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network
Y Zhong, A Zhou, L Zhang, F **g, Z Zuo - PloS one, 2019 - journals.plos.org
As the root cause of illegal cyber activities, botnets are evolving continuously over the last
two decades. Current researches on botnet command and control mechanism based on …
two decades. Current researches on botnet command and control mechanism based on …
[BOOK][B] An efficient approach to online bot detection based on a reinforcement learning technique
MM Alauthman - 2016 - search.proquest.com
In recent years, Botnets have been adopted as a popular method used to carry and spread
many malicious codes on the Internet. These codes pave the way to conducting many …
many malicious codes on the Internet. These codes pave the way to conducting many …