Kestrel: an XMPP-based framework for many task computing applications
Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers
Analysis of traffic correlation attacks on router queues
Computer Networks: The International Journal of Computer and Telecommunications Networking
A statistical approach to botnet virulence estimation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Characterizing internet worm infection structure
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
On detecting active worms with varying scan rate
Computer Communications
Botnet command and control based on Short Message Service and human mobility
Computer Networks: The International Journal of Computer and Telecommunications Networking
Survey and taxonomy of botnet research through life-cycle
ACM Computing Surveys (CSUR)
A worm-containing strategy using a social network and PageRank
Proceedings of the 2013 Research in Adaptive and Convergent Systems
A botnet-based command and control approach relying on swarm intelligence
Journal of Network and Computer Applications
Hi-index | 0.00 |
A “botnet” consists of a network of compromised computers controlled by an attacker (“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be well prepared for future attacks, it is not enough to study how to detect and defend against the botnets that have appeared in the past. More importantly, we should study advanced botnet designs that could be developed by botmasters in the near future. In this paper, we present the design of an advanced hybrid peer-to-peer botnet. Compared with current botnets, the proposed botnet is harder to be shut down, monitored, and hijacked. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. In the end, we suggest and analyze several possible defenses against this advanced botnet.