Botnet: classification, attacks, detection, tracing, and preventive measures

  • Authors:
  • Jing Liu;Yang Xiao;Kaveh Ghaboosi;Hongmei Deng;Jingyuan Zhang

  • Affiliations:
  • Department of Computer Science, The University of Alabama, Tuscaloosa, AL;Department of Computer Science, The University of Alabama, Tuscaloosa, AL;The Centre for Wireless Communications, University of Oulu, Finland;Intelligent Automation, Inc., Rockville, MD;Department of Computer Science, The University of Alabama, Tuscaloosa, AL

  • Venue:
  • ICICIC '09 Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges.