Filters








559 Hits in 4.8 sec

Botnets as an Instrument of Warfare [chapter]

Eric Koziel, David Robinson
2011 IFIP Advances in Information and Communication Technology  
Seven scenarios are used to demonstrate how traditional applications of botnets such as spam, theft of resources and distributed denial-of-service attacks can have implications across the spectrum of warfare  ...  Criminals leverage the flexibility and anonymity associated with botnets to harvest personal data, generate spam, distribute malware and launch distributed denial-of-service attacks.  ...  As instruments of warfare, nuclear weapons have a wide range of operational and strategic implications. We explore a similar notion by considering botnets as instruments of warfare.  ... 
doi:10.1007/978-3-642-24864-1_2 fatcat:kpnvq77l5nahdlccr4iqceu2vm

On the detection and identification of botnets

Alexander K. Seewald, Wilfried N. Gansterer
2010 Computers & security  
We develop and discuss automated and self-adaptive systems for detecting and classifying botnets based on machine learning techniques and integration of human expertise.  ...  We illustrate experiments based on real-life data collected with a darknet set up for this purpose to show the potential of the proposed concept for (i) and (ii).  ...  This can clearly be done as a purely passive analysis without any tip-off to the botnet operators traced.  ... 
doi:10.1016/j.cose.2009.07.007 fatcat:2c5jbvxtmrgbdddos3qwxh4wiy

IOT Security Challenges and Measures to Mitigate: Novel Perspectives

Manas Kumar Yogi, Y Himatej, M Mahesh reddy
2018 International Journal of Engineering & Technology  
Many people hide personal data in social media to eliminate these sort of privacy issues but common man nowadays is becoming a passive participant due to lack of security in these IOT devices that are  ...  The security of IOT is becoming more complex and may have a serious consequence. So, now we have many security challenges like privacy concerns, routine cryptography, passive data collection etc.  ...  Conclusion: Our paper is a sincere attempt towards bringing out the current challenges at each architectural level of a distributed IoT environment.  ... 
doi:10.14419/ijet.v7i2.7.11081 fatcat:hovo5p7binehtcxr2sruiqnd5u

Botnets: How to Fight the Ever-Growing Threat on a Technical Level [chapter]

Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini
2013 SpringerBriefs in Cybersecurity  
In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status.  ...  This particularly applies for botnets, which are a special kind of malware.  ...  Since the distribution of spam emails is offered as a service from botnet operators, spam can provide a particular source of income.  ... 
doi:10.1007/978-1-4471-5216-3_2 fatcat:m5uyvssccbd7vmzwnhtk35gzme

The case for in-the-lab botnet experimentation

Joan Calvet, Carlton R. Davis, José M. Fernandez, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji
2010 Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10  
By observing the load characteristics and yield (rate of spamming) of such a botnet, we can draw interesting conclusions about its real-world operations and design decisions made by its creators.  ...  Their study via various analysis, modelling and experimental methods are integral parts of the development cycle of any such botnet mitigation schemes.  ...  We are also very grateful for the valuable input and feedback we received from Patrick McDaniel on previous versions of this manuscript.  ... 
doi:10.1145/1920261.1920284 dblp:conf/acsac/CalvetDFMSGBS10 fatcat:2yomwdqknfdmray2jr6zwxyhbu

Portfolio optimization of computer and mobile botnets

Qi Liao, Zhen Li
2013 International Journal of Information Security  
Botnet, a network of compromised computers controlled by botmasters, can perform various forms of malicious attacks and has emerged as one of the top security problems yet to be solved.  ...  The strategic playing by botmasters and users is modeled in a game theoretical framework. Various equilibrium solutions are discussed in terms of their welfare implications to botmasters and users.  ...  , Spam, etc) C a The acquisition cost of compromising machines C o The operation cost of maintaining botnets A User activity level (e.g., the number of applications installed, the frequency of  ... 
doi:10.1007/s10207-013-0206-9 fatcat:sd2xjtazhfbcjbkjlh543l4knm

SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks [article]

Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar
2012 arXiv   pre-print
We establish a Stackelberg game framework to capture strategic interactions between honeybots and botnets, and use quantitative methods to understand the tradeoffs of honeybots for their deployment and  ...  Among these attacks, social botnets have sophisticated infrastructure that leverages compromised users accounts, known as bots, to automate the creation of new social networking accounts for spamming and  ...  The HE model in Section IV describes strategic operations of honeybots at a microscopic level while the HD model in Section V provides a macroscopic description of the population dynamics of bots and honeybots  ... 
arXiv:1207.5844v1 fatcat:gcdzmrqtprappccbjmi6ya4j24

Statistical Characterization of the Botnets C&C Traffic

Pedro Correia, Eduardo Rocha, António Nogueira, Paulo Salvador
2012 Procedia Technology - Elsevier  
its C&C server(s); study of the botnet behavior, namely its possible scanning activities, Denial of Service (DoS) attacks, spamming or phishing activities, among other possibilities.  ...  Several approaches can be taken to study this phenomenon: analyze its source code, which can be a hard task mainly due to license restrictions; study of the botnet control, particularly the activity of  ...  Acknowledgments This research was supported in part by Fundação para a Ciência e a Tecnologia under the research projects PTDC/EEA-TEL/101880/2008 and PEst-OE/EEI/LA0008/2011.  ... 
doi:10.1016/j.protcy.2012.02.030 fatcat:j2tyk6h6fzdevdeu23ulgxqfte

Botnet Detection on the Analysis of Zeus Panda Financial Botnet

2019 International Journal of Engineering and Advanced Technology  
As opposed to DDoS and spam malware, the stealthy idea of monetary botnets requires new methods and modern research with a specific end goal to detect,analyze and even to receive them down.  ...  This paper exhibits a work-inadvance research went for making a framework ready to moderate the money related botnet issue.  ...  Malvertising, Spam and watering-hole attacks are generally used to target clients.To prevention of banking Trojan injection incorporates harming advertisements and maintaining a strategic websites commonly  ... 
doi:10.35940/ijeat.f7941.088619 fatcat:h2z7tz2a5rbk7ibkbgszfrxah4

Botnet Detection and Analysis Using Honeynet

M .C. Sacchetin, A. R. A. Gregio, L.O. Duarte, A. Montes
2008 The International Journal of Forensic Computer Science  
We outline a real case of compromise, detailing analysis techniques specially developed for botnets study, including the tools, the topology and strategies adopted, as well as the results obtained in the  ...  In this work we discuss some new techniques used by intruders to control a group of compromised machines (botnets).  ...  The --SPAM forwarding: the distribution of unsolicited e-mail (spam) is another activity that can be done using botnets, since a large number of machines sending SPAM at the same time allows greater distribution  ... 
doi:10.5769/j200801003 fatcat:q4yjew4k3jfihov7nfiab7tjc4

Bot Net Detection by Using SSL Encryption
English

2015 International Journal of Research and Applications  
Botnets spread throw Distributed Denial of service. When a large number of computers act under the control of a single attacker it is called a botnet.  ...  The Upatre attachment comes in the form of a zip file. Its purpose is to download a payload from elsewhere, detonate it, and disappear.  ...  Botnets are now recognized as one of the most serious security threats, such as DDos, spam, click fraud, etc. Botnets often use some common protocols, such as P2P, HTTP, IRC, etc.  ... 
doi:10.17812/ijra.2.6(49)2015 fatcat:kbvmtj37gjazfiiqec72ocxgee

A framework for financial botnet analysis

Marco Riccardi, David Oro, Jesus Luna, Marco Cremonini, Marc Vilanova
2010 2010 eCrime Researchers Summit  
Contrary to DDoS and spam malware, the stealthy nature of financial botnets requires new techniques and novel research in order to detect, analyze and even to take them down.  ...  Based on previous experiences with two of the proposed architecture building blocks -the Dorothy framework and a blacklistbased IP reputation system-, we show that it is feasible to map financial botnet  ...  We also would like to thank Richard Hayden, Toni Felguera and David Hernando for their insightful comments and suggestions during the development of the framework.  ... 
doi:10.1109/ecrime.2010.5706697 dblp:conf/ecrime/RiccardiOLCV10 fatcat:qcctw656xbfm3d6aepfv6i6v6q

Cross-country analysis of spambots

Vaibhav Garg, Thomas Koster, Linda Jean Camp
2013 EURASIP Journal on Information Security  
We begin to answer there questions by conducting a cross-country empirical analysis of economic factors that correlate with the prevalence of spam and associated botnets.  ...  Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a higher percentage of spam than others despite its prohibition?  ...  We are also thankful to the Stat/Math Center at Indiana University, specifically Thomas Jackson, for their help with the statistical analysis.  ... 
doi:10.1186/1687-417x-2013-3 fatcat:xhtudwg5obh2vp6fcenagb6q5m

Optimising sybil attacks against P2P-based botnets

Carlton R. Davis, Jose M. Fernandez, Stephen Neville
2009 2009 4th International Conference on Malicious and Unwanted Software (MALWARE)  
in Storm's use of Overnet and more recently in the appearance of HTTP-tunneled P2P botnets, such as Waledac and Conficker.  ...  Addressing and mitigating modern global-scale botnets is a pressing Internet security issue, particularly, given that these botnets are known to be provide attackers with the large-scale low-cost computing  ...  Between 85 to 95 percent of spams originated from botnets [19] , with spamming being highly profitable to cybercriminals, with estimates existing that $3.5M per year was genetered from Storm-produced  ... 
doi:10.1109/malware.2009.5403016 dblp:conf/malware/DavisFN09 fatcat:egaaqam4gne73kpvbmg4gsueyy

SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets

C. Rossow, D. Andriesse, T. Werner, B. Stone-Gross, D. Plohmann, C. J. Dietrich, H. Bos
2013 2013 IEEE Symposium on Security and Privacy  
We provide assessments on the sizes of all eleven active P2P botnets, showing that some P2P botnet families contain over a million bots.  ...  In this paper, we introduce a formal graph model to capture the intrinsic properties and fundamental vulnerabilities of P2P botnets.  ...  This work was supported by the Federal Ministry of Education and Research of Germany (Grant 16BY1110, MoBE), the European Research Council Starting Grant "Rosetta" and the EU FP7-ICT-257007 SysSec project  ... 
doi:10.1109/sp.2013.17 dblp:conf/sp/RossowAWSPDB13 fatcat:cubskjq6kbehhlc3g5ylrtrojq
« Previous Showing results 1 — 15 out of 559 results