Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …
A taxonomy of botnet behavior, detection, and defense
S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …
the botnet phenomenon. It is important to organize this knowledge to better understand the …
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …
BotSniffer: Detecting botnet command and control channels in network traffic
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …
previous malware, botnets have the characteristic of a command and control (C&C) channel …
Bothunter: Detecting malware infection through ids-driven dialog correlation.
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …
recognizing the infection and coordination dialog that occurs during a successful malware …
A survey of botnet and botnet detection
M Feily, A Shahrestani… - 2009 Third International …, 2009 - ieeexplore.ieee.org
Among the various forms of malware, botnets are emerging as the most serious threat
against cyber-security as they provide a distributed platform for several illegal activities such …
against cyber-security as they provide a distributed platform for several illegal activities such …
Automated classification and analysis of internet malware
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …
Folk models of home computer security
R Wash - Proceedings of the Sixth Symposium on Usable …, 2010 - dl.acm.org
Home computer systems are insecure because they are administered by untrained users.
The rise of botnets has amplified this problem; attackers compromise these computers …
The rise of botnets has amplified this problem; attackers compromise these computers …
Method and system for detecting malicious and/or botnet-related domain names
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …