Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

[HTML][HTML] A survey of emerging threats in cybersecurity

J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …

Measurement and analysis of Hajime, a peer-to-peer IoT botnet

S Herwig, K Harvey, G Hughey, R Roberts… - Network and Distributed …, 2019 - par.nsf.gov
The Internet of Things (IoT) introduces an unprece-dented diversity and ubiquity to
networked computing. It also introduces new attack surfaces that are a boon to attackers …

Botnet communication patterns

G Vormayr, T Zseby, J Fabini - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …

A taxonomy of botnet behavior, detection, and defense

S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …

Discriminating DDoS attacks from flash crowds using flow correlation coefficient

S Yu, W Zhou, W Jia, S Guo, Y **ang… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attack is a critical threat to the Internet, and botnets are
usually the engines behind them. Sophisticated botmasters attempt to disable detectors by …

Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools

T Mahmood, U Afzal - 2013 2nd national conference on …, 2013 - ieeexplore.ieee.org
The rapid growth of the Internet has brought with it an exponential increase in the type and
frequency of cyber attacks. Many well-known cybersecurity solutions are in place to …

An enhancing framework for botnet detection using generative adversarial networks

C Yin, Y Zhu, S Liu, J Fei… - … Conference on Artificial …, 2018 - ieeexplore.ieee.org
The botnet, as one of the most formidable threats to cyber security, is often used to launch
large-scale attack sabotage. How to accurately identify the botnet, especially to improve the …