A Survey on Latest Botnet Attack and Defense

被引:34
|
作者
Zhang, Lei [1 ]
Yu, Shui [1 ]
Wu, Di [1 ]
Watters, Paul [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[2] Univ Ballarat, Internet Commerce Secur Lab, Ballarat, Vic 3364, Australia
关键词
Survey; Botnet; Fast Fluxing; Domain Fluxing;
D O I
10.1109/TrustCom.2011.11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A botnet is a group of compromised computers, which are remotely controlled by hackers to launch various network attacks, such as DDoS attack and information phishing. Botnet has become a popular and productive tool behind many cyber attacks. Recently, the owners of some botnets, such as storm worm, torpig and conflicker, are employing fluxing techniques to evade detection. Therefore, the understanding of their fluxing tricks is critical to the success of defending from botnet attacks. Motivated by this, we survey the latest botnet attacks and defenses in this paper. We begin with introducing the principles of fast fluxing (FF) and domain fluxing (DF), and explain how these techniques were employed by botnet owners to fly under the radar. Furthermore, we investigate the state-of-art research on fluxing detection. We also compare and evaluate those fluxing detection methods by multiple criteria. Finally, we discuss future directions on fighting against botnet based attacks.
引用
下载
收藏
页码:53 / 60
页数:8
相关论文
共 50 条
  • [1] A Survey on Botnet: Classification, Detection and Defense
    Amini, Pedram
    Araghizadeh, Muhammad Amin
    Azmi, Reza
    2015 INTERNATIONAL ELECTRONICS SYMPOSIUM (IES), 2015, : 233 - 238
  • [2] Dynamic game model of botnet DDoS attack and defense
    Wang, Yichuan
    Ma, Jianfeng
    Zhang, Liumei
    Ji, Wenjiang
    Lu, Di
    Hei, Xinhong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3127 - 3140
  • [3] Optimal Attack Strategies in a Dynamic Botnet Defense Model
    Shang, Y.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (01): : 29 - 33
  • [4] Adversarial Attack and Defense: A Survey
    Liang, Hongshuo
    He, Erlu
    Zhao, Yangyang
    Jia, Zhe
    Li, Hao
    ELECTRONICS, 2022, 11 (08)
  • [5] Survey of Textual Backdoor Attack and Defense
    Zheng M.
    Lin Z.
    Liu Z.
    Fu P.
    Wang W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (01): : 221 - 242
  • [6] A Survey of Botnet and Botnet Detection
    Feily, Maryam
    Shahrestani, Alireza
    Ramadass, Sureswaran
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 268 - +
  • [7] A survey on the evolution of bootkits attack and defense techniques
    Zhou, Yilin
    Peng, Guojun
    Li, Zichuan
    Liu, Side
    CHINA COMMUNICATIONS, 2024, 21 (01) : 102 - 130
  • [8] A Survey on the Evolution of Bootkits Attack and Defense Techniques
    Yilin Zhou
    Guojun Peng
    Zichuan Li
    Side Liu
    China Communications, 2024, 21 (01) : 102 - 130
  • [9] Adversarial Attack and Defense on Graph Data: A Survey
    Sun, Lichao
    Dou, Yingtong
    Yang, Carl
    Zhang, Kai
    Wang, Ji
    Yu, Philip S.
    He, Lifang
    Li, Bo
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (08) : 7693 - 7711
  • [10] A Survey of Attack and Defense Techniques for Reputation Systems
    Hoffman, Kevin
    Zage, David
    Nita-Rotaru, Cristina
    ACM COMPUTING SURVEYS, 2009, 42 (01)