Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SAINT.2011.71guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Correlation Analysis between Spamming Botnets and Malware Infected Hosts

Published: 18 July 2011 Publication History
  • Get Citation Alerts
  • Abstract

    Many of recent cyber attacks are being launched by botnets for the purpose of carrying out large-scale cyber attacks such as spam emails, Distributed Denial of Service (DDoS), network scanning and so on. In many cases, these botnets consist of a lot of bots or zombie PCs which have been infected by a specific malware, and they try to propagate themselves into other victim systems through the Internet. In order to mitigate heavy damage of botnet based cyber attacks, it is needed to better understand the basic infrastructure of botnets as well as the underlying malwares of them. In this paper, we carried out correlation analysis between 10 spamming botnets identified by analyzing 3 weeks of spam emails in our previous work and malware infected hosts that observed at our darknets and honey pots. By comparing members (i.e., bots) of 10 spamming botnets with source hosts of dark net and honey pot traffic, we found that 7.2% ~ 37.5% of spamming botnets has been infected by four different malwares at least.

    Cited By

    View all
    • (2018)Multidimensional investigation of source port 0 probingDigital Investigation: The International Journal of Digital Forensics & Incident Response10.5555/2838421.283845111:S2(S114-S123)Online publication date: 20-Dec-2018
    • (2012)Behavior analysis of long-term cyber attacks in the darknetProceedings of the 19th international conference on Neural Information Processing - Volume Part V10.1007/978-3-642-34500-5_73(620-628)Online publication date: 12-Nov-2012

    Index Terms

    1. Correlation Analysis between Spamming Botnets and Malware Infected Hosts
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        SAINT '11: Proceedings of the 2011 IEEE/IPSJ International Symposium on Applications and the Internet
        July 2011
        595 pages
        ISBN:9780769544236

        Publisher

        IEEE Computer Society

        United States

        Publication History

        Published: 18 July 2011

        Author Tags

        1. botnet
        2. correlation analysis
        3. darknet
        4. honeypot
        5. malware
        6. spam

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 12 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2018)Multidimensional investigation of source port 0 probingDigital Investigation: The International Journal of Digital Forensics & Incident Response10.5555/2838421.283845111:S2(S114-S123)Online publication date: 20-Dec-2018
        • (2012)Behavior analysis of long-term cyber attacks in the darknetProceedings of the 19th international conference on Neural Information Processing - Volume Part V10.1007/978-3-642-34500-5_73(620-628)Online publication date: 12-Nov-2012

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media