Botnet

Known as: C&C server, Bot net, Command and control server 
A botnet is a number of Internet-connected computers communicating with other similar machines in which components located on networked computers… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1967-2017
010020019672017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Botnets are now recognized as one of the most serious security threats. In contrast to previous malware, botnets have the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Malicious botnets are networks of compromised computers that are controlled remotely to perform large-scale distributed denial-of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table I
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
A “botnet” consists of a network of compromised computers controlled by an attacker (“botmaster”). Recently, botnets have become… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Time zones play an important and unexplored role in malware epidemics. To understand how time and location affect malware spread… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
To date, techniques to counter cyber-attacks have predominantly been reactive; they focus on monitoring network traffic… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Botnets—networks of (typically compromised) machines—are often used for nefarious activities (e.g., spam, click fraud, denial-of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?