A Survey of Botnet Technology and Defenses

被引:74
|
作者
Bailey, Michael [1 ]
Cooke, Evan [1 ]
Jahanian, Farnam [1 ]
Xu, Yunjing [1 ]
Karir, Manish [2 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
[2] Merit Network Inc, Ann Arbor, MI USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/CATCH.2009.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Global Internet threats have undergone a profound transformation. from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world [6]. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today's networks intersect to inform the field of botnet technology and defense.
引用
收藏
页码:299 / +
页数:3
相关论文
共 50 条
  • [1] Research on botnet mechanisms and defenses
    Jiang, Jian
    Zhuge, Jian-Wei
    Duan, Hai-Xin
    Wu, Jian-Ping
    [J]. Ruan Jian Xue Bao/Journal of Software, 2012, 23 (01): : 82 - 96
  • [2] A Survey of Botnet and Botnet Detection
    Feily, Maryam
    Shahrestani, Alireza
    Ramadass, Sureswaran
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 268 - +
  • [3] A Wide Survey on Botnet
    Lashkari, Arash Habibi
    Ghalebandi, Seyedeh Ghazal
    Moradhaseli, Mohammad Reza
    [J]. DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 445 - +
  • [4] A Survey of Botnet in Cyber Security
    Shetu, Syeda Farjana
    Saifuzzaman, Mohd.
    Moon, Nazmun Nessa
    Nur, Fernaz Narin
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 174 - 177
  • [5] A Survey on Botnet: Classification, Detection and Defense
    Amini, Pedram
    Araghizadeh, Muhammad Amin
    Azmi, Reza
    [J]. 2015 INTERNATIONAL ELECTRONICS SYMPOSIUM (IES), 2015, : 233 - 238
  • [6] Mobile botnet detection: a comprehensive survey
    Sajad Hamzenejadi
    Mahdieh Ghazvini
    Seyedamiryousef Hosseini
    [J]. International Journal of Information Security, 2023, 22 : 137 - 175
  • [7] A Survey on Latest Botnet Attack and Defense
    Zhang, Lei
    Yu, Shui
    Wu, Di
    Watters, Paul
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 53 - 60
  • [8] A survey of botnet detection based on DNS
    Alieyan, Kamal
    ALmomani, Ammar
    Manasrah, Ahmad
    Kadhum, Mohammed M.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2017, 28 (07): : 1541 - 1558
  • [9] A survey of botnet detection based on DNS
    Kamal Alieyan
    Ammar ALmomani
    Ahmad Manasrah
    Mohammed M. Kadhum
    [J]. Neural Computing and Applications, 2017, 28 : 1541 - 1558
  • [10] A survey of botnet crimeware life cycle
    Ibrahim, Laheeb M.
    Hatim, Karam
    [J]. International Journal of Reasoning-based Intelligent Systems, 2012, 4 (04) : 250 - 255