A Survey on Botnet: Classification, Detection and Defense

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 601

This Paper With 14 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICEEE07_329

تاریخ نمایه سازی: 19 اردیبهشت 1395

Abstract:

In recent years, Botnets have become an important security problem on the Internet. Botnets have used for many attacks, such as banking information theft, spam, distributed denial-of-service (DDoS), identity theft and phishing. Then, they have been proposed as a major research topic in network security. Although there are several surveys on the Botnets, they usually do not include a complete review on Botnet phenomenon. This paper is a survey on Botnet that provides a brief of classifications, techniques and algorithms of Botnet detection and defense. In this survey, we provide a comparison on existing researches. We present an overview of studies on Botnet and discuss in detail including topologies, architectures, communication protocols, infection mechanisms, attacks, purposes, prevention techniques, detection sources, detection data, detection techniques, detection algorithms and response techniques.

Authors

Pedram Amini

Dept. of Information and Communications Technology Malek-Ashtar University of Technology Tehran, Iran

Muhammad Amin Araghizadeh

Dept. of Electrical and Computer Engineering University of Tehran Tehran, Iran

Reza Azmi

Dept. of Technical and Engineering Alzahra University Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Model for Network Flow Based Botnet Detection, " In Proceedings ...
  • Conference _ Telec ommunication, Media and _ اا10 _ Techno-Ec ...
  • A. Karim, Ahmad, R.B. Salleh, M. Shiraz, S.A.A. Shah, I. ...
  • M.A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A ...
  • H.R. Zeidanloo, M.J.Z. Shooshtari, P.V. Amoli, M. Safari, and M. ...
  • _ _ _ _ _ _ Damballa Inc., 209 [25] ...
  • P. Sinha, A. Boukhtouta, V .H. Belarde, and M Debbabi, ...
  • C.C. Zou, and R. Cunningham, "Honeyp ot-aware advanced Botnet construction ...
  • S. Gianvecchio, M. Xie, Z. Wu, and H. Wang, "Humans ...
  • _ _ _ on Advances in Communication and Control Systems, ...
  • P. Jaikumar, and A.C. Kak, "A graph-theoretic framework for isolating ...
  • E. Cooke, F. Jahanian, and D. McPherson, "The zombie roundup: ...
  • C.J. Dietrich, C. Rossow, F.C. Freiling, H. Bos, M. van ...
  • _ _ _ _ International Conference on Digital Society(ICDS), IEEE, ...
  • S. Abraham, and I. Chengalur- Smith, "An overview of social ...
  • D. Geer, "Malicious bots threaten network security, " Computer, IEEE ...
  • V. Zlomislic, K. Fertalj, and V. Sruk, "Denial of service ...
  • N. Vratonjic, M.H. Manshaei, M. Raya, and J.P. Hubaux, "ISPs ...
  • Botnet Enlists Firefox Users to Hack Web Sites [Online], _ ...
  • _ _ _ _ _ C ommunications, Networking and Mobile ...
  • C.V. Zhou, C. Leckie, and S. Karunasekera, "Collaborative detection of ...
  • V.L. Thing, M. Sloman, and N. Dulay, "A survey of ...
  • _ _ _ _ _ _ Computing Surveys (CSUR), vol. ...
  • M. Abliz, "Internet denil of service attacks and defense mechanisms, ...
  • _ _ _ _ _ _ and Technologie ...
  • _ _ _ Computing, Information and Control (ICICIC), IEEE, pp. ...
  • M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. ...
  • _ _ _ _ Proceedings of the 4" International Conference ...
  • Z. Zhu, G. Lu, Y. Chen, Z. Fu, P. Roberts, ...
  • L. Zhang, S. Yu, D. Wu, and P. Watters, "A ...
  • _ _ _ _ _ no. 5, pp. 878-903, 2014. ...
  • S. Khattak, N.R. Ramay, K.R. Khan, A.A. Syed, and S.A. ...
  • _ _ _ _ _ servers: classification and art, " ...
  • D. Dagon, G. Gu, C.P. Lee, and W. Lee, "A ...
  • _ _ _ _ C ommunicatios and Information Systems Conference ...
  • M. Rataj, "Simulation of Botnet C&, Chammels, " Ph.D Dissertation, ...
  • _ _ _ intrusions and malware, and vulnerability assesment, Springer ...
  • B. Shirley, and Chad D. Mano, "Sub-Botnet coordination using tokens ...
  • _ _ _ Symposium, 2007. ...
  • G. Gu, P.A. Porras, V. Yegneswaran, M.W. Fong, and W. ...
  • X. Shu, J. Smiy, D. Yao, and H. Lin, "Massive ...
  • H. Binsalleeh, M. Mannan, A. Youssef, and M. Debbabi, "Detection ...
  • R. Hofstede, P. Celeda, B. Trammell, I. Drago, R. Sadre, ...
  • Tutorials, IEEE, vol. 16, no. 4, pp. 2037-2064, 2014. ...
  • F. Haddadi, D.L. Cong, L. Porter, and A.N. Z incir-Heywood, ...
  • A.H.R. Al Awadi, and B. Belaton, "Multi-phase IRC Botnet and ...
  • _ _ _ _ _ _ [72] G. Gu, R. ...
  • Analysis of Network Traffic for Protocol-and S truc ture -Independent ...
  • _ _ _ _ of the Network [74] _ _ ...
  • based on network behavior, " Botnet Detection, Springer US, pp. ...
  • G. Fedynyshyn, M.C. Chuah, and G. Tan, "Detection and classification ...
  • P. Amini, R. Azmi, and M.A. Araghizadeh, "Botnet Detection using ...
  • _ _ _ _ _ _ K-means, " ACM Transactions ...
  • S. Saad, I. Traore, A. Ghorbani, B. Sayed, D. Zhao, ...
  • Conference on Privacy, Security and Trust (PST), IEEE, pp. 174-180, ...
  • _ _ _ _ ommunications Surveys & Tutorials, IEEE, vol. ...
  • S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-sale: ...
  • _ _ Proceedings of the International Conference on Intelligence and ...
  • H.S. Nair, and S.E.V. Ewards, "A Study on Botnet Detection ...
  • K. Hamnah, and S. Gianvecchio, "Zeuslite: a tool for Botnet ...
  • K. Roebuck, "Electronic Signature: High-impact Strategies - What You ...
  • R.K. Shahzad, and N. Lavesson, "Detecting scareware by mining _ ...
  • A. Sadeghian, and M. Zamani, "Detecting and preventing DDoS attacks ...
  • U. Wijesinghe, U. Tupakula, and V. Varadharajan, "An Enhanced ...
  • J. Kok, and B. Kurz, "Analysis of the Botnet ecosystem, ...
  • K. Dahbur, B. Mohammad, and A.B. Tarakji, "A survey of ...
  • M.D. Aime, and F. Guasconi, "Enhanced vulnerability ontology for information ...
  • M. Warkentin, and R. Willison, "Behavioral and policy issues in ...
  • N.Y. Lee, and H.J. Chiang, "The research of Botnet detection ...
  • S. Behal, A.S. Brar, and K. Kumar, _ Signature-based Botnet ...
  • _ _ _ Networks, Kabiri P (ed). IGI Global: Pensilvania, ...
  • _ _ _ pp. 715-720, 2007. ...
  • _ _ (CCNC), IEEE, pp. 476-481, 2008. ...
  • S. Yadav, A.K.K. Reddy, A.L. Reddy, and S. Ranjan, "Detecting ...
  • R. Sharifhya, and M. Abadi, "DFBotKiller: Domain-flux Botnet _ _ ...
  • _ _ _ (DSN), IEEE/IFIP, pp. 121-132, 2011. ...
  • _ _ _ _ Models in Business and Industry, 2014. ...
  • _ _ pp. 601-604, 2010. ...
  • C.J. Dietrich, C. Rossow, and N Pohlmann, "CoCoSpot: Clustering and ...
  • _ _ _ _ _ _ Data Sciences, Springer ...
  • W.T. Strayer, R. Walsh, C. Livadas, and D. Lapsley, "Detecting ...
  • _ _ _ _ Internet Technology and Applications, IEEE, pp. ...
  • K. Kuwabara, H. Kikuchi, M. Terada, and M. Fujiwara, "Heuristics ...
  • I.A. Saeed, A. Selamat, A.M. Abuagoub, and S.B. Abdulaziz. "A ...
  • K. Wang, C.Y. Huang, S.J. Lin, and Y .D. Lin, ...
  • B. Al-Duwairi, and L. Al-Ebbini, "BotDigger: a fuzzy inference system ...
  • H.R. Zeidanloo, and A.B.A. Manaf, "Botnet detection by monitoring ...
  • G. Gu, J. Zhang, J., and W. Lee, "BotSniffer: Detecting ...
  • M. Stevanovic, and J.M. Pedersen, "An efficient flow-based Botnet Networking ...
  • E.B. Beigi, H. H. Jazi, N. Stakhanova, and A.A. Ghorbani, ...
  • نمایش کامل مراجع