Corpus ID: 18017910

A Wide Scale Survey on Botnet

@article{Amit2011AWS,
  title={A Wide Scale Survey on Botnet},
  author={Kumar Amit},
  journal={International Journal of Computer Applications},
  year={2011},
  volume={34},
  pages={10-23}
}
  • K. Amit
  • Published 29 November 2011
  • Computer Science
  • International Journal of Computer Applications
the diverse forms of malware, Botnet is the serious threat which occurs commonly in today"s cyber attacks and cyber crimes. Botnet are designed to perform predefined functions in an automated fashion, where these malicious activities ranges from online searching of data, accessing lists, moving files sharing channel information to DDoS attacks against critical targets, phishing, click fraud etc. Existence of command and control(CC in turn throws challenges in the mitigation of Botnet attacks… Expand
A Survey on Anomaly Detection of Botnet in Network
Botnets are a major threat of the current Internet. Understanding the recent procreation of botnets relying on peer-to- peer networks is critical for diminishing this threat. Today botnets are seenExpand
A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches
TLDR
This survey analyzes and compares the most important efforts carried out in an application-based detection area and covers the mitigation approaches for the Botnet-based DDoS flooding attacks. Expand
Threats of Botnet to Internet Security and Respective Defense Strategies
Botnets are one of the most dangerous threats to internet security. The problem of Botnet is global in nature. A botnet is a network of computers infected with a malicious program that allowsExpand
Botnet Threats to E-Commerce Web Applications and Their Detection
Security issues in e-commerce web applications are still exploratory, and in spite of an increase in e-commerce application research and development, lots of security challenges remain unanswered.Expand
Multivariate Statistical Analysis on Anomaly P2P Botnets Detection
TLDR
This paper proposed anomaly detection through chi-square multivariate statistical analysis which currently focuses on time duration and time slot and shows a high detection accuracy and low false positive that make it as one of the promising approach to reveal botserver. Expand
An efficient approach to online bot detection based on a reinforcement learning technique
TLDR
A traffic reduction approach with reinforcement learning (RL) method is combined in order to create an online Bot detection system that achieves good a detection rate of 98.3% as well as a low false positive rate (FPR) of 0.012% in the online evaluation. Expand
International Journal of Advance Research in Computer Science and Management Studies
Botnets are a major threat of the current Internet. Understanding the recent procreation of botnets relying on peer-topeer networks is critical for diminishing this threat. Today botnets are seen toExpand
Multivariate Statistical Analysis on Anomaly P 2 P Botnets Detection
Botnets population is rapidly growing and they become a huge threat on the Internet. Botnets has been declared as Advanced Malware (AM) and Advanced Persistent Threat (APT) listed attacks which isExpand
An integrated network-based mobile botnet detection system
TLDR
A mobile botnet detection system, called MBotCS is proposed and positive evidence about the effectiveness of the supervised learning approach, as a solution to the mobile botnets detection problem is resulted in. Expand
A Study on Botnets Utilizing DNS
TLDR
This paper analyzes the current uses of DNS by botnet malware writers and operators and examines possible clues that network administrators and savvy computer users can utilize to identify and or mitigate the threat. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 56 REFERENCES
A Survey of Botnet and Botnet Detection
TLDR
A survey of botnet and botnet detection techniques is presented, which clarifies botnet phenomenon and discusses botnets detection techniques, and summarizes bot network detection techniques in each class and provides a brief comparison. Expand
A taxonomy of Botnet detection techniques
TLDR
This survey classifies Botnet detection techniques into two approaches which are based on setting up honeynets and another approach which is based on Intrusion Detection System ( IDS) which has been categorized into signature-based and anomaly-based detection techniques. Expand
Botnet detection based on traffic monitoring
TLDR
This paper proposed a new general detection framework for Botnets based on finding similar communication patterns and behaviors among the group of hosts that are performing at least one malicious activity. Expand
Botnet Detection by Monitoring Group Activities in DNS Traffic
TLDR
This paper proposes a botnet detection mechanism by monitoring DNS traffic to detect botnets, which form a group activity in DNS queries simultaneously sent by distributed bots, which is more robust than the previous approaches. Expand
Botnet Command and Control Mechanisms
TLDR
This paper provides a classification of Botnets C & C channels and evaluates well-known protocols (e.g. IRC, HTTP, and P2P) which are being used in each of them. Expand
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
TLDR
This paper proposes an approach that uses network-based anomaly detection to identify botnet C&C channels in a local area network without any prior knowledge of signatures or C &C server addresses, and shows that BotSniffer can detect real-world botnets with high accuracy and has a very low false positive rate. Expand
Honeypot detection in advanced botnet attacks
TLDR
This paper presents a hardware and software independent honeypot detection methodology based on the following assumption: security professionals deploying honeypots have a liability constraint such that they cannot allow their honeypots to participate in real attacks that could cause damage to others, while attackers do not need to follow this constraint. Expand
Your botnet is my botnet: analysis of a botnet takeover
TLDR
This paper reports on efforts to take control of the Torpig botnet and study its operations for a period of ten days, which provides a new understanding of the type and amount of personal information that is stolen by botnets. Expand
An Analysis of the Asprox Botnet
  • R. Borgaonkar
  • Computer Science
  • 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
  • 2010
TLDR
The architecture of a contemporary advanced bot commonly known as Asprox, a type of malware that combines the two threat vectors of forming a botnet and of generating SQL injection attacks, is described. Expand
Zombies and botnets
Bot programs allow attackers to remotely control vulnerable computers and form virtual networks of zombies - botnets. Botnets can be leveraged to orchestrate concerted attacks against other computingExpand
...
1
2
3
4
5
...