Using whitelisting to mitigate DDoS attacks on critical internet sites
IEEE Communications Magazine
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
An assessment of overt malicious activity manifest in residential networks
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Social networks as a platform for distributed dictionary attack
CIT'11 Proceedings of the 5th WSEAS international conference on Communications and information technology
Detecting malware's failover C&C strategies with squeeze
Proceedings of the 27th Annual Computer Security Applications Conference
Agent-based simulation of cooperative defence against botnets
Concurrency and Computation: Practice & Experience
Automatica (Journal of IFAC)
Botnets: a heuristic-based detection framework
Proceedings of the Fifth International Conference on Security of Information and Networks
Collaborative behavior visualization and its detection by observing darknet traffic
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
The Ethics of Cyberweapons in Warfare
International Journal of Technoethics
Simulation-based study of botnets and defense mechanisms against them
Journal of Computer and Systems Sciences International
Computer Networks: The International Journal of Computer and Telecommunications Networking
The SIC botnet lifecycle model: A step beyond traditional epidemiological models
Computer Networks: The International Journal of Computer and Telecommunications Networking
Malicious automatically generated domain name detection using Stateful-SBB
EvoApplications'13 Proceedings of the 16th European conference on Applications of Evolutionary Computation
Timing analysis in P2P botnet traffic using probabilistic context-free grammars
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Detecting latent attack behavior from aggregated Web traffic
Computer Communications
NetGator: malware detection using program interactive challenges
DIMVA'12 Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Survey and taxonomy of botnet research through life-cycle
ACM Computing Surveys (CSUR)
Analyzing and defending against web-based malware
ACM Computing Surveys (CSUR)
Feature selection for detection of peer-to-peer botnet traffic
Proceedings of the 6th ACM India Computing Convention
Characterizing home network traffic: an inside view
Personal and Ubiquitous Computing
Hi-index | 0.01 |
Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world [6]. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today’s networks intersect to inform the field of botnet technology and defense.