A Review on Taxonomy of Botnet Detection

被引:0
|
作者
Panimalar, P. [1 ]
Rameshkumar, K. [1 ]
机构
[1] Bharathiar Univ, Res & Dev Ctr, Coimbatore 641046, Tamil Nadu, India
关键词
Attacks; Botnet; Command and Control (C&C); Fuzzy Pattern Recognition-based Filtering (FPRF); Malware;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Malicious software, 'malware`, has acquired an important position in modern high-tech life. There are several malware like virus, worms, trojan horses, root kit forms regularly attacking the networks particularly on internet to steal the information. Apart from these threats botnet is one of the widespread and serious threats, which occurs commonly in today's cyber attacks. The botnet detection has been a major research topic in recent years. This paper clarifies about botnet phenomenon, some of the botnet detection and overview of an extensible fuzzy pattern recognition-based filtering algorithm for botnet detection.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A Taxonomy of Botnet Detection Techniques
    Zeidanloo, Hossein Rouhani
    Shooshtari, Mohammad Jorjor Zadeh
    Amoli, Payam Vahdani
    Safari, M.
    Zamani, Mazdak
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 158 - 162
  • [2] A Taxonomy of Botnet Behavior, Detection, and Defense
    Khattak, Sheharbano
    Ramay, Naurin Rasheed
    Khan, Kamran Riaz
    Syed, Affan A.
    Khayam, Syed Ali
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 898 - 924
  • [3] Botnet Detection Techniques: A Review
    Khehra, Gulbadan
    Sofat, Sanjeev
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1319 - 1326
  • [4] A taxonomy of botnet structures
    Dagon, David
    Gu, Guofei
    Lee, Christopher P.
    Lee, Wenke
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 325 - 338
  • [5] A taxonomy of botnet structures
    Dagon, David
    Gu, Guofei
    Lee, Christopher P.
    Lee, Wenke
    BOTNET DETECTION: COUNTERING THE LARGEST SECURITY THREAT, 2008, 36 : 143 - +
  • [6] Botnet and P2P Botnet Detection Strategies: A Review
    Dhayal, Himanshi
    Kumar, Jitender
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1077 - 1082
  • [7] A Survey of Botnet and Botnet Detection
    Feily, Maryam
    Shahrestani, Alireza
    Ramadass, Sureswaran
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 268 - +
  • [8] An Usage-Centric Botnet Taxonomy
    Czosseck, Christian
    Podins, Karlis
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 65 - 72
  • [9] Mobile Botnet Attacks: A Thematic Taxonomy
    Karim, Ahmad
    Shah, Syed Adeel Ali
    Salleh, Rosli
    NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2014, 276 : 153 - 164
  • [10] Botnet detection techniques: review, future trends, and issues
    Ahmad Karim
    Rosli Bin Salleh
    Muhammad Shiraz
    Syed Adeel Ali Shah
    Irfan Awan
    Nor Badrul Anuar
    Journal of Zhejiang University SCIENCE C, 2014, 15 : 943 - 983