Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

A taxonomy of botnet behavior, detection, and defense

S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection

G Gu, R Perdisci, J Zhang, W Lee - 2008 - usenix.org
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …

BotSniffer: Detecting botnet command and control channels in network traffic

G Gu, J Zhang, W Lee - 2008 - corescholar.libraries.wright.edu
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …

Bothunter: Detecting malware infection through ids-driven dialog correlation.

G Gu, PA Porras, V Yegneswaran, MW Fong… - USENIX Security …, 2007 - usenix.org
We present a new kind of network perimeter monitoring strategy, which focuses on
recognizing the infection and coordination dialog that occurs during a successful malware …

A survey of botnet and botnet detection

M Feily, A Shahrestani… - 2009 Third International …, 2009 - ieeexplore.ieee.org
Among the various forms of malware, botnets are emerging as the most serious threat
against cyber-security as they provide a distributed platform for several illegal activities such …

Automated classification and analysis of internet malware

M Bailey, J Oberheide, J Andersen, ZM Mao… - Recent Advances in …, 2007 - Springer
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the
Internet, the integrity of its hosts, and the privacy of its users. A core element of defense …

Folk models of home computer security

R Wash - Proceedings of the Sixth Symposium on Usable …, 2010 - dl.acm.org
Home computer systems are insecure because they are administered by untrained users.
The rise of botnets has amplified this problem; attackers compromise these computers …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …