Detecting Botnets Through Log Correlation

@article{AlHammadi2006DetectingBT,
  title={Detecting Botnets Through Log Correlation},
  author={Yousof Al-Hammadi and Uwe Aickelin},
  journal={CoRR},
  year={2006},
  volume={abs/1001.2665}
}
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, and backdoors. In response to these threats, new effective techniques are needed to detect the presence of botnets. In this paper, we have used an interception technique to monitor Windows Application Programming Interface (API) functions calls made by communication applications and store these calls with their… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-9 of 9 references

Intercepting System API Calls

  • S. Kim
  • Retrieved Jun
  • 2006

Three ways to Inject Your Code into Another Process

  • R. Kuster
  • Retrieved Jun
  • 2006
1 Excerpt

Bots and Botnets: Risks, Issues and Prevention

  • M. Overton
  • Proceedings of Virus Bulletin Conference
  • 2005
1 Excerpt

The Evolution of Malicious IRC bots . White Paper: Symantec Security Response

  • J. Canavan
  • In Proceedings of Virus Bulletin Conference
  • 2005
3 Excerpts

Intercepting System API Calls Anomaly Detection for Internet Worms

  • S. Kim.
  • Retrieved Jun

Similar Papers

Loading similar papers…