Sciweavers

IEEESP
2011
12 years 8 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
TDSC
2010
168views more  TDSC 2010»
12 years 11 months ago
An Advanced Hybrid Peer-to-Peer Botnet
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
Ping Wang, Sherri Sparks, Cliff Changchun Zou
GAMESEC
2010
13 years 3 months ago
ISPs and Ad Networks Against Botnet Ad Fraud
Botnets are a serious threat on the Internet and require huge resources to be thwarted. ISPs are in the best position to fight botnets and there are a number of recently proposed i...
Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim...
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
13 years 3 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
CSREASAM
2008
13 years 6 months ago
A Multi-Layered Approach to Botnet Detection
Robert F. Erbacher, Adele Cutler, Pranab Banerjee,...
IMC
2006
ACM
13 years 11 months ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
LCN
2006
IEEE
13 years 11 months ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
DSN
2006
IEEE
13 years 11 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
SAINT
2007
IEEE
13 years 11 months ago
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior
In this paper, we propose three metrics for detecting botnets through analyzing their behavior. Our social infrastructure (i.e., the Internet) is currently experiencing the danger...
Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shi...
APNOMS
2009
Springer
13 years 11 months ago
Attack Model and Detection Scheme for Botnet on 6LoWPAN
Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have ...
Eung Jun Cho, Jin Ho Kim, Choong Seon Hong