An Overview of Modern Botnets

被引:11
|
作者
Negash, Neamen [1 ]
Che, Xiangdong [1 ]
机构
[1] Eastern Michigan Univ, Sch Informat Secur & Appl Comp SISAC, Coll Technol, Ypsilanti, MI 48197 USA
来源
INFORMATION SECURITY JOURNAL | 2015年 / 24卷 / 4-6期
关键词
botnets; DDOS; malware; mitigation; network security;
D O I
10.1080/19393555.2015.1075629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets, a network of malware-infected computers, have been used for a range of malicious activities. Evolving from fast fluxing to employing anonymous networks, they have matured and have become exceedingly sophisticated over the years. Understanding and dismantling these networks has become a global effort that requires active research and cooperation between private and government sectors. In this paper, we provide the latest overview of modern botnets in terms of structure, purpose, formation, detection, and mitigation. We also review recent developments on botnets and related research in combating this phenomenon.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [31] BOTNETS AS AN INSTRUMENT OF WARFARE
    Koziel, Eric
    Robinson, David
    CRITICAL INFRASTRUCTURE PROTECTION V, 2011, 367 : 19 - 28
  • [32] Botnets: threats and responses
    Jeong, Ok-Ran
    Kim, Chulyun
    Kim, Won
    So, Jungmin
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2011, 7 (01) : 6 - +
  • [33] A Framework for Understanding Botnets
    Leonard, Justin
    Xu, Shouhuai
    Sandhu, Ravi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 917 - 922
  • [34] The War Against Botnets
    Greengard, Samuel
    COMMUNICATIONS OF THE ACM, 2012, 55 (02) : 16 - 18
  • [35] How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets
    Lu, Zhuo
    Wang, Wenye
    Wang, Cliff
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1501 - 1509
  • [36] Botnets tracking and global threat intelligence - Behavioral approaches to identifying distributed botnets
    Nazarov, Alexey
    2012 THIRD WORLDWIDE CYBERSECURITY SUMMIT (WCS), 2012,
  • [37] Botnets: A Study and Analysis
    Kirubavathi, G.
    Anitha, R.
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, 2014, 246 : 203 - 214
  • [38] Botnets, and the CyberCriminal underground
    Mielke, Clinton J., II
    Chen, Hsinchun
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 206 - +
  • [39] On the detection and identification of botnets
    Seewald, Alexander K.
    Gansterer, Wilfried N.
    COMPUTERS & SECURITY, 2010, 29 (01) : 45 - 58
  • [40] Mining Botnets and Their Evolution Patterns
    Jaehoon Choi
    Jaewoo Kang
    Jinseung Lee
    Chihwan Song
    Qingsong Jin
    Sunwon Lee
    Jinsun Uh
    Journal of Computer Science & Technology, 2013, 28 (04) : 605 - 615