Introduction to algorithms
Digital Signal Processing: A Practical Approach
Digital Signal Processing: A Practical Approach
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Diagnosing network-wide traffic anomalies
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Delay- and Disruption-Tolerant Networking
Delay- and Disruption-Tolerant Networking
Optimal worm-scanning method using vulnerable-host distributions
International Journal of Security and Networks
BotHunter: detecting malware infection through IDS-driven dialog correlation
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
SS'08 Proceedings of the 17th conference on Security symposium
Deriving a closed-form expression for worm-scanning strategies
International Journal of Security and Networks
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Spatial-temporal modeling of malware propagation in networks
IEEE Transactions on Neural Networks
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Hi-index | 0.00 |
In this work, we present a novel intelligent botnet, called the delay-tolerant botnet, that intentionally adds random delays to command propagation and endeavours to avoid detection. We then study the scalability of delay-tolerant botnets. Specifically, we apply mathematical analysis to derive the average delay required to distribute a command to all bots in three types of command and control architectures: centralised, distributed, and hybrid delay-tolerant botnets. We find that in all cases, the delay increases approximately logarithmically with the number of bots, indicating that the delay-tolerant botnets are scalable. Finally, we verify the analytical results by simulations.