Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Mobile security catching up? revealing the nuts and bolts of the security of mobile devices

M Becher, FC Freiling, J Hoffmann… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
We are currently moving from the Internet society to a mobile society where more and more
access to information is done by previously dumb phones. For example, the number of …

[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection

G Gu, R Perdisci, J Zhang, W Lee - 2008 - usenix.org
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …

[PDF][PDF] EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.

L Bilge, E Kirda, C Kruegel, M Balduzzi - Ndss, 2011 - sites.cs.ucsb.edu
The domain name service (DNS) plays an important role in the operation of the Internet,
providing a two-way map** between domain names and their numerical identifiers. Given …

Bothunter: Detecting malware infection through ids-driven dialog correlation.

G Gu, PA Porras, V Yegneswaran, MW Fong… - USENIX Security …, 2007 - usenix.org
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …

Your botnet is my botnet: analysis of a botnet takeover

B Stone-Gross, M Cova, L Cavallaro, B Gilbert… - Proceedings of the 16th …, 2009 - dl.acm.org
Botnets, networks of malware-infected machines that are controlled by an adversary, are the
root cause of a large number of security problems on the Internet. A particularly …

A multifaceted approach to understanding the botnet phenomenon

M Abu Rajab, J Zarfoss, F Monrose… - Proceedings of the 6th …, 2006 - dl.acm.org
The academic community has long acknowledged the existence of malicious botnets,
however to date, very little is known about the behavior of these distributed computing …

A survey of botnet and botnet detection

M Feily, A Shahrestani… - 2009 Third International …, 2009 - ieeexplore.ieee.org
Among the various forms of malware, botnets are emerging as the most serious threat
against cyber-security as they provide a distributed platform for several illegal activities such …

Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks

TF Yen, A Oprea, K Onarlioglu, T Leetham… - Proceedings of the 29th …, 2013 - dl.acm.org
As more and more Internet-based attacks arise, organizations are responding by deploying
an assortment of security products that generate situational intelligence in the form of logs …

The crossfire attack

MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …