Mining Botnets and Their Evolution Patterns

被引:0
|
作者
Jaehoon Choi
Jaewoo Kang
Jinseung Lee
Chihwan Song
Qingsong Jin
Sunwon Lee
Jinsun Uh
机构
[1] Korea University,Department of Computer Science and Engineering
[2] Daou Technology Inc.,undefined
关键词
botnet; botnet evolution; botnet spamming;
D O I
暂无
中图分类号
学科分类号
摘要
The botnet is the network of compromised computers that have fallen under the control of hackers after being infected by malicious programs such as trojan viruses. The compromised machines are mobilized to perform various attacks including mass spamming, distributed denial of service (DDoS) and additional trojans. This is becoming one of the most serious threats to the Internet infrastructure at present. We introduce a method to uncover compromised machines and characterize their behaviors using large email logs. We report various spam campaign variants with different characteristics and introduce a statistical method to combine them. We also report the long-term evolution patterns of the spam campaigns.
引用
收藏
页码:605 / 615
页数:10
相关论文
共 50 条
  • [41] An inside look at botnets
    Barford, Paul
    Yegneswaran, Vinod
    MALWARE DETECTION, 2007, : 171 - +
  • [42] Botnets for scalable management
    Francois, Jerome
    State, Radu
    Festor, Olivier
    MANAGING VIRTUALIZATION OF NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4785 : 1 - 12
  • [43] Botnets: Big and bigger
    McCarty, Bill
    IEEE Security and Privacy, 2003, 1 (04): : 87 - 90
  • [44] BOTNETS AS AN INSTRUMENT OF WARFARE
    Koziel, Eric
    Robinson, David
    CRITICAL INFRASTRUCTURE PROTECTION V, 2011, 367 : 19 - 28
  • [45] Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures
    Ahmad, Aakash
    Pahl, Claus
    Altamimi, Ahmed B.
    Alreshidi, Abdulrahman
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (06) : 1278 - 1306
  • [46] GOLD MINERALIZATION PATTERNS IN RELATION TO THE LITHOLOGIC AND TECTONIC EVOLUTION OF THE CHIBOUGAMAU MINING DISTRICT, QUEBEC, CANADA
    GUHA, J
    DUBE, B
    PILOTE, P
    CHOWN, EH
    ARCHAMBAULT, G
    BOUCHARD, G
    MINERALIUM DEPOSITA, 1988, 23 (04) : 293 - 298
  • [47] The application of text mining methods in innovation research: current state, evolution patterns, and development priorities
    Antons, David
    Gruenwald, Eduard
    Cichy, Patrick
    Salge, Torsten Oliver
    R & D MANAGEMENT, 2020, 50 (03) : 329 - 351
  • [48] Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures
    Aakash Ahmad
    Claus Pahl
    Ahmed B. Altamimi
    Abdulrahman Alreshidi
    Journal of Computer Science and Technology, 2018, 33 : 1278 - 1306
  • [49] Botnets: threats and responses
    Jeong, Ok-Ran
    Kim, Chulyun
    Kim, Won
    So, Jungmin
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2011, 7 (01) : 6 - +
  • [50] Incremental mining and re-mining of frequent patterns without storage of intermediate patterns
    Tseng, Fan-Chen
    2007 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-4, 2007, : 538 - 542