Botnets as the Modern Attack Vector

被引:0
|
作者
Antonucci, Frank [1 ]
Chowdhury, Md Minhaz [1 ]
机构
[1] East Stroudsburg Univ, Dept Comp Sci, East Stroudsburg, PA 18301 USA
关键词
Botnet; Peer; 2; Internet RelayChat; Distributed Denial of Service; Honeypot/Honeynet; Neural Net; Internet of Things;
D O I
10.1109/AIIoT54504.2022.9817360
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Botnets have become an increasingly more common threat in modern computing. For attackers they provide some unique benefits, and for defenders they pose some distinct new problems. As such they garner a certain attraction from the modern attacker. In this survey paper we outline the reasons for the increased use of botnets, as well as the traits that make them desirable for attackers. In addition, we also discuss some of the ways in which we may try to prevent such attacks from occurring, with a focus on preventative training for users and systems, and through the capture and analysis of malware. With the data from captured malware in mind, we discuss the ways in which security can be improved with data gathered from attacks. We also address the current and potential future methods of detecting botnets and their activity using various tools and methodologies. The culmination is an overview of the traits of a botnet, why they have become more common, methods to prevent or mitigate, and how we can look to discover them before an attack.
引用
收藏
页码:585 / 590
页数:6
相关论文
共 50 条
  • [1] An Overview of Modern Botnets
    Negash, Neamen
    Che, Xiangdong
    INFORMATION SECURITY JOURNAL, 2015, 24 (4-6): : 127 - 132
  • [2] A Discovery of Sequential Attack Patterns of Malware in Botnets
    Rosyid, Nur Rohman
    Ohrui, Masayuki
    Kikuchi, Hiroaki
    Sooraksa, Pitikhate
    Terada, Masato
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [3] Botnets Detecting Attack based on DNS Features
    Alieyan, Kamal
    Anbar, Mohammed
    Almomani, Ammar
    Abdullah, Rosni
    Alauthman, Mohammad
    2018 19TH INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2018, : 20 - 23
  • [4] Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets
    Wang, Tian-Zuo
    Wang, Huai-Min
    Liu, Bo
    Ding, Bo
    Zhang, Jing
    Shi, Pei-Chang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2731 - 2749
  • [5] A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models
    Alomari, Dorieh M.
    Anis, Fatima
    Alabdullatif, Maryam
    Aljamaan, Hamoud
    27TH INTERNATIONAL CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2023, 2023, : 493 - 498
  • [6] Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems
    Alavi, Seyed Ali
    Moghadam, Hamed Pourvali
    Jahangir, Amir Hossein
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2025, 48
  • [7] Catching modern botnets using active integrated evidential reasoning
    Tang, Yongning
    Cheng, Guang
    Yu, James T.
    Zhang, Bin
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 10
  • [8] The Modern Attack on Tuberculosis
    Gass, R. S.
    AMERICAN JOURNAL OF PUBLIC HEALTH AND THE NATIONS HEALTH, 1943, 33 (01): : 88 - 89
  • [9] THE MODERN ATTACK ON TUBERCULOSIS
    不详
    AMERICAN JOURNAL OF NURSING, 1942, 42 (10) : 1223 - 1223
  • [10] The Modern Attack on Tuberculosis
    Hart, Alan L.
    AMERICAN JOURNAL OF PUBLIC HEALTH AND THE NATIONS HEALTH, 1947, 37 (07): : 932 - 932