An Analysis of the Asprox Botnet

@inproceedings{Borgaonkar2010AnAO,
  title={An Analysis of the Asprox Botnet},
  author={R. Borgaonkar},
  booktitle={SECURWARE},
  year={2010}
}
  • R. Borgaonkar
  • Published in SECURWARE 2010
  • Computer Science
  • The presence of large pools of compromised computers, also known as botnets, or zombie armies, represents a very serious threat to Internet security. This paper describes the architecture of a contemporary advanced bot commonly known as Asprox. Asprox is a type of malware that combines the two threat vectors of forming a botnet and of generating SQL injection attacks. The main features of the Asprox botnet are the use of centralized command and control structure, HTTP based communication, use… CONTINUE READING
    19 Citations
    Botnets: A survey
    • 296
    A survey on Botnet: Classification, detection and defense
    • 13
    Botnet Detection Using Passive DNS
    • 2014
    • 9
    • PDF
    ANALYTICAL MODELS FOR THE INTERACTION BETWEEN BOTMASTERS AND HONEYPOTS
    • PDF
    Robust botnet detection techniques for mobile and network environments
    Content Spoofing via Compounded SQL Injection
    • 1
    An integrated network-based mobile botnet detection system
    • PDF
    Survey of approaches and features for the identification of HTTP-based botnet traffic
    • 36
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 58 REFERENCES
    The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
    • 585
    • PDF
    Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
    • 343
    • PDF
    A multifaceted approach to understanding the botnet phenomenon
    • 643
    • PDF
    Botnets as a Vehicle for Online Crimes
    • 106
    Botnets as a Vehicle for Online Crime
    • 203
    • PDF
    Peer to peer botnet detection for cyber-security: a data mining approach
    • 22
    • PDF
    Towards Next-Generation Botnets
    • 42
    • PDF
    IPv6 Stateless Address Autoconfiguration Considered Harmful
    • J. Lindqvist
    • Computer Science
    • MILCOM 2006 - 2006 IEEE Military Communications conference
    • 2006
    • 13
    The evolution of malicious IRC bots
    • 53
    • PDF