Peerambush: Multi-layer perceptron to detect peer-to-peer botnet

AHH Kabla, AH Thamrin, M Anbar, S Manickam… - Symmetry, 2022 - mdpi.com
Due to emerging internet technologies that mostly depend on the decentralization concept,
such as cryptocurrencies, cyber attackers also use the decentralization concept to develop …

A brief review of advanced monitoring mechanisms in peer-to-peer (P2P) Botnets

MA Al-Shareeda, S Manickam… - 2022 8th …, 2022 - ieeexplore.ieee.org
Due to threats from botnets, internet security is becoming less safe. An attack plan can only
be planned out to take down the botnet after the monitoring activities to understand the …

C3PO: large-scale study of covert monitoring of C&C servers via over-permissioned protocol infiltration

J Fuller, RP Kasturi, A Sikder, H Xu, B Arik… - Proceedings of the …, 2021 - dl.acm.org
Current techniques to monitor botnets towards disruption or takedown are likely to result in
inaccurate data gathered about the botnet or be detected by C&C orchestrators. Seeking a …

Reliable recon in adversarial peer-to-peer botnets

D Andriesse, C Rossow, H Bos - Proceedings of the 2015 Internet …, 2015 - dl.acm.org
The decentralized nature of Peer-to-Peer (P2P) botnets precludes traditional takedown
strategies, which target dedicated command infrastructure. P2P botnets replace this …

The study on the botnet and its prevention policies in the internet of things

Y Ji, L Yao, S Liu, H Yao, Q Ye… - 2018 IEEE 22nd …, 2018 - ieeexplore.ieee.org
With the rapid development of Internet of Things (IOT), IOT is more and more important. Also,
it faces serious security issues. This paper analyzes Mirai's architecture. The core …

Review of advanced monitoring mechanisms in peer-to-peer (p2p) botnets

WY Shen, S Manickam, MA Al-Shareeda - arxiv preprint arxiv:2207.12936, 2022 - arxiv.org
Internet security is getting less secure because of the existing of botnet threats. An attack
plan can only be planned out to take down the botnet after the monitoring activities to …

On the resilience of P2P-based botnet graphs

S Haas, S Karuppayah, S Manickam… - … IEEE Conference on …, 2016 - ieeexplore.ieee.org
P2P botnets represent another escalation level in the race of arms between criminals and
the research community. By utilizing a distributed P2P architecture they are resilient against …

Next generation p2p botnets: Monitoring under adverse conditions

L Böck, E Vasilomanolakis, M Mühlhäuser… - Research in Attacks …, 2018 - Springer
The effects of botnet attacks, over the years, have been devastating. From high volume
Distributed Denial of Service (DDoS) attacks to ransomware attacks, it is evident that …

Sensorbuster: On identifying sensor nodes in p2p botnets

S Karuppayah, L Böck, T Grube, S Manickam… - Proceedings of the 12th …, 2017 - dl.acm.org
The ever-growing number of cyber attacks originating from botnets has made them one of
the biggest threat to the Internet ecosystem. Especially P2P-based botnets like ZeroAccess …

Zeus milker: circumventing the p2p zeus neighbor list restriction mechanism

S Karuppayah, S Roos, C Rossow… - 2015 IEEE 35th …, 2015 - ieeexplore.ieee.org
The emerging trend of highly-resilient P2P botnets poses a huge security threat to our
modern society. Carefully designed countermeasures as applied in sophisticated P2P …