Abstract
Increasingly sophisticated botnets have emerged during the last several years. However, security researchers, businesses, and governments are attacking botnets from a number of different angles---and sometimes winning.
- Bhatia, J.S., Sehgal, R.K., and Kumar, S. Honeynet based botnet detection using command signatures, Advances in Wireless, Mobile Networks and Applications, Al-Majeed, S.S., Hu, C.-L., and Nagamalai, D. (Eds.), Springer-Verlag, Berlin and Heidelberg, Germany, 2011.Google ScholarCross Ref
- Yadav, S., Reddy, A.K.K., Reddy, A.L.N., and Ranja, S. Detecting algorithmically generated malicious domain names, 2010 Internet Measurement Conference, Melbourne, Australia, Nov. 1-3, 2010. Google ScholarDigital Library
- Yin, C.Y., Ghorbani, A.A., and Sun, R.X. Research on new botnet detection strategy based on information materials, Advanced Materials Research 282-283, July 2011.Google ScholarCross Ref
- Zhang, J., Luo, X., Perdisci, R., Gu, G., Lee, W., and Feamster, N. Boosting the scalability of botnet detection using adaptive traffic sampling, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, March 22-24, 2011. Google ScholarDigital Library
Index Terms
- The war against botnets
Recommendations
Spamming botnets: signatures and characteristics
In this paper, we focus on characterizing spamming botnets by leveraging both spam payload and spam server traffic properties. Towards this goal, we developed a spam signature generation framework called AutoRE to detect botnet-based spam emails and ...
Spamming botnets: signatures and characteristics
SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communicationIn this paper, we focus on characterizing spamming botnets by leveraging both spam payload and spam server traffic properties. Towards this goal, we developed a spam signature generation framework called AutoRE to detect botnet-based spam emails and ...
Comments