A Survey of Botnet Technology and Defenses

被引:74
|
作者
Bailey, Michael [1 ]
Cooke, Evan [1 ]
Jahanian, Farnam [1 ]
Xu, Yunjing [1 ]
Karir, Manish [2 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
[2] Merit Network Inc, Ann Arbor, MI USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/CATCH.2009.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Global Internet threats have undergone a profound transformation. from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world [6]. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today's networks intersect to inform the field of botnet technology and defense.
引用
下载
收藏
页码:299 / +
页数:3
相关论文
共 50 条
  • [41] A Survey on Split Manufacturing: Attacks, Defenses, and Challenges
    Perez, Tiago D.
    Pagliarini, Samuel
    IEEE ACCESS, 2020, 8 (08): : 184013 - 184035
  • [42] Botnet Detection Technology Based on the On-line Error Model
    Zhu, Xuan Zhang
    Li, Ya Fei
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1801 - 1806
  • [43] BlockchainBot: A Novel Botnet Infrastructure Enhanced by Blockchain Technology and IoT
    Gao, Haoyu
    Li, Leixiao
    Chang, Xiangyang
    Wan, Jianxiong
    Li, Jie
    Du, Jinze
    Zhang, Xiaoxu
    ELECTRONICS, 2022, 11 (07)
  • [44] Future of missile defenses lies in advanced technology
    Wall, R
    AVIATION WEEK & SPACE TECHNOLOGY, 1999, 151 (07): : 71 - 73
  • [45] Survey of approaches and features for the identification of HTTP-based botnet traffic
    Acarali, Dilara
    Rajarajan, Muttukrishnan
    Komninos, Nikos
    Herwono, Ian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 76 : 1 - 15
  • [46] A Survey on Security Threats and Security Defenses of Wireless LAN
    Huang, Bo
    Lu, Rui
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 49 - 52
  • [47] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    ACM COMPUTING SURVEYS, 2020, 53 (03)
  • [48] Android Security: A Survey of Issues, Malware Penetration, and Defenses
    Faruki, Parvez
    Bharmal, Ammar
    Laxmi, Vijay
    Ganmoor, Vijay
    Gaur, Manoj Singh
    Conti, Mauro
    Rajarajan, Muttukrishnan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 998 - 1022
  • [49] Adversarial attacks and defenses in Speaker Recognition Systems: A survey
    Lan, Jiahe
    Zhang, Rui
    Yan, Zheng
    Wang, Jie
    Chen, Yu
    Hou, Ronghui
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 127
  • [50] Adversarial attacks and defenses in explainable artificial intelligence: A survey
    Baniecki, Hubert
    Biecek, Przemyslaw
    INFORMATION FUSION, 2024, 107