skip to main content
department
Free Access

The war against botnets

Published:01 February 2012Publication History
Skip Abstract Section

Abstract

Increasingly sophisticated botnets have emerged during the last several years. However, security researchers, businesses, and governments are attacking botnets from a number of different angles---and sometimes winning.

References

  1. Bhatia, J.S., Sehgal, R.K., and Kumar, S. Honeynet based botnet detection using command signatures, Advances in Wireless, Mobile Networks and Applications, Al-Majeed, S.S., Hu, C.-L., and Nagamalai, D. (Eds.), Springer-Verlag, Berlin and Heidelberg, Germany, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  2. Yadav, S., Reddy, A.K.K., Reddy, A.L.N., and Ranja, S. Detecting algorithmically generated malicious domain names, 2010 Internet Measurement Conference, Melbourne, Australia, Nov. 1-3, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yin, C.Y., Ghorbani, A.A., and Sun, R.X. Research on new botnet detection strategy based on information materials, Advanced Materials Research 282-283, July 2011.Google ScholarGoogle ScholarCross RefCross Ref
  4. Zhang, J., Luo, X., Perdisci, R., Gu, G., Lee, W., and Feamster, N. Boosting the scalability of botnet detection using adaptive traffic sampling, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, March 22-24, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The war against botnets

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 55, Issue 2
      February 2012
      111 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/2076450
      Issue’s Table of Contents

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 February 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • department
      • Popular
      • Un-reviewed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format