An algorithm for anomaly-based botnet detection
SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2
Botnet Detection by Monitoring Group Activities in DNS Traffic
CIT '07 Proceedings of the 7th IEEE International Conference on Computer and Information Technology
Wide-scale botnet detection and characterization
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
SS'08 Proceedings of the 17th conference on Security symposium
Hi-index | 0.00 |
Cyber attacks using a botnet have a bad influence on the information system, such as recent 7.7 DDoS incident by the botnet and explosive growth of spam e-mails. The purpose of the attack is also changing from curiosity and showing-off to economic interest such as the DDoS attack against the competitor and accessing confidential information. This paper reviews the method of active protection from the secondary damage by bot infection (DDoS attack, spam sending, and personal/financial information stealing, etc.), by designing the advanced quarantine technique that extracts and blocks traffic from the botnet only, and based on the important information of the botnet.