DocumentCode :
1927910
Title :
A taxonomy of Botnet detection techniques
Author :
Zeidanloo, Hossein Rouhani ; Shooshtari, Mohamad Jorjor Zadeh ; Amoli, Payam Vahdani ; Safari, M. ; Zamani, Mazdak
Author_Institution :
Fac. of Comput. Sci. & Inf. Syst., Univ. of Technol. Malaysia, Kuala Lumpur, Malaysia
Volume :
2
fYear :
2010
fDate :
9-11 July 2010
Firstpage :
158
Lastpage :
162
Abstract :
Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today´s cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They provide a distributed platform for several illegal activities such as launching distributed denial of service (DDOS) attacks against critical targets, malware distribution, phishing, and click fraud. Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols (e.g., IRC, HTTP) and structures (e.g., centralized), and can become ineffective as Botnets change their structure and C&C techniques. The detection of Botnet has been a major research topic in recent years. Different techniques and approaches have been proposed for detection and tracking of Botnet. This survey classifies Botnet detection techniques into two approaches. One approach is based on setting up honeynets and another approach is based on Intrusion Detection System( IDS) which has been categorized into signature-based and anomaly-based detection techniques.
Keywords :
Internet; command and control systems; computer crime; cryptographic protocols; invasive software; unsolicited e-mail; Botnet detection technique; Commond-and-Control infrastructure; Taxonomy; anomaly based detection technique; compromised computer; cyber attack; distributed denial of service; honeynet; intrusion detection system; malware distribution; Computational modeling; Computers; Cryptography; Monitoring; Botnet; P2P; bot; malicious activities; patterns;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-5537-9
Type :
conf
DOI :
10.1109/ICCSIT.2010.5563555
Filename :
5563555
Link To Document :
بازگشت