Mining Botnets and Their Evolution Patterns

被引:0
|
作者
Jaehoon Choi
Jaewoo Kang
Jinseung Lee
Chihwan Song
Qingsong Jin
Sunwon Lee
Jinsun Uh
机构
[1] Korea University,Department of Computer Science and Engineering
[2] Daou Technology Inc.,undefined
关键词
botnet; botnet evolution; botnet spamming;
D O I
暂无
中图分类号
学科分类号
摘要
The botnet is the network of compromised computers that have fallen under the control of hackers after being infected by malicious programs such as trojan viruses. The compromised machines are mobilized to perform various attacks including mass spamming, distributed denial of service (DDoS) and additional trojans. This is becoming one of the most serious threats to the Internet infrastructure at present. We introduce a method to uncover compromised machines and characterize their behaviors using large email logs. We report various spam campaign variants with different characteristics and introduce a statistical method to combine them. We also report the long-term evolution patterns of the spam campaigns.
引用
收藏
页码:605 / 615
页数:10
相关论文
共 50 条
  • [1] Mining Botnets and Their Evolution Patterns
    Jaehoon Choi
    Jaewoo Kang
    Jinseung Lee
    Chihwan Song
    Qingsong Jin
    Sunwon Lee
    Jinsun Uh
    Journal of Computer Science & Technology, 2013, 28 (04) : 605 - 615
  • [2] Mining Botnets and Their Evolution Patterns
    Choi, Jaehoon
    Kang, Jaewoo
    Lee, Jinseung
    Song, Chihwan
    Jin, Qingsong
    Lee, Sunwon
    Uh, Jinsun
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (04) : 605 - 615
  • [3] Botnets: the evolution and the possible solution
    Lazovic, Miroslav
    Simic, Dejan
    TECHNICS TECHNOLOGIES EDUCATION MANAGEMENT-TTEM, 2011, 6 (03): : 829 - 835
  • [4] Evolution Study of Android Botnets
    Pieterse, Heloise
    Burke, Ivan
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 232 - 240
  • [5] How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets
    Lu, Zhuo
    Wang, Wenye
    Wang, Cliff
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1501 - 1509
  • [6] The Evolution of Bashlite and Mirai IoT Botnets
    Marzano, Artur
    Alexander, David
    Fonseca, Osvaldo
    Fazzion, Elverton
    Hoepers, Cristine
    Steding-Jessen, Klaus
    Chaves, Marcelo H. P. C.
    Cunha, Halo
    Guedes, Dorgival
    Meira, Wagner, Jr.
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 818 - 823
  • [7] A Discovery of Sequential Attack Patterns of Malware in Botnets
    Rosyid, Nur Rohman
    Ohrui, Masayuki
    Kikuchi, Hiroaki
    Sooraksa, Pitikhate
    Terada, Masato
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [8] On the Evolution and Impact of Mobile Botnets in Wireless Networks
    Lu, Zhuo
    Wang, Wenye
    Wang, Cliff
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (09) : 2304 - 2316
  • [9] A Combined Fusion and Data Mining Framework for the Detection of Botnets
    Kiayias, Aggelos
    Neumann, Justin
    Walluck, David
    McCusker, Owen
    CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 273 - +
  • [10] BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows
    Lagraa, Sofiane
    Francois, Jerome
    Lahmadi, Abdelkader
    Miner, Marine
    Hammerschmidt, Christian
    State, Radu
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,