Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1967486.1967488acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
keynote

On botnets

Published: 08 November 2010 Publication History

Abstract

A botnet is a network of computers on the Internet infected with software robots, bots. There are numerous botnets. Some of them control millions of computers. Botnets have become the platform for the scourge of the Internet, namely, spam e-mails, launch denial of service attacks, click fraud, theft of sensitive information, cyber sabotage, cyber warfare, etc. In this paper, we review the status of the botnets, how they work, and how they may be defeated.

References

[1]
Criminals 'may overwhelm the web', BBC, 25 January 2007
[2]
F. Freiling, T. Holz, and G. Wicherski, "Botnet Tracking - Exploring a Root Cause Methodology," ESORICS 2005, LNCS 3679, pp. 319--335, 2005.
[3]
D. Barroso, "Botnets-The Silent Threat," ENISA position paper, no. 3, pp. 1--9, Nov. 2007
[4]
http://en.wikipedia.org/wiki/Denial-of-service_attack
[5]
http://news.yahoo.com/s/ap/20100728/ap_on_go_ca_st_pe/us_cyber_bust. "APNewsBreak: FBI says mastermind of botnet nabbed - Yahoo! News", July 2007
[6]
http://www.messagelabs.com
[7]
http://blogs.msdn.com/b/tzink
[8]
http://TechRepublic.com
[9]
http://www.activeblognews.com/node/427
[10]
Damballa Threat Research, "The IMDDOS Botnet: Discovery and Analysis", Technical Report, 2010
[11]
http://www.zdnet.com/blog/security/research-small-diy-botnets-prevent-in-enterprise-networks.4485, "Research: Small DIY botnets prevalent in enterprise networks", ZDNet
[12]
http://www.Damballa.com/downloads/press/Kraken_Response.pdf
[13]
http://us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/study_of_pushdo.pdf
[14]
http://www.scmagazineus.com/the-rustock-botnet-spams-again/article/112940 "The Rustock botnet spams again", SC Magazine US
[15]
http://www.messagelabs.com/milreport/MLI_2010_04_Apr_FiNAL_EN.pdf
[16]
http://computerworld.co.nz/news.nsf/security/good-guys-bring-down-the-mega-d-botnet. July 2010
[17]
http://www.secureworks.com/research/threats/botnets2009
[18]
"Mariposa Botnet Analysis," Technical Report, Defense Intelligence, 2010
[19]
http://techpp.com/2010/07/15/zeuszbot-trojan-attacks-credit-cards-of-banks/
[20]
http://blogs.rsa.com/rsafarl/one-sinowal-trojan-one-gang-hundreds-of-thousands-of-compromised-accounts/
[21]
Riva Richmond, "Malware Hits Computerized Industrial Equipment", The New York Times, September 24, 2010
[22]
Gunter Ollman, "Botnet Communication Topologies," Damballa white paper, June 2009
[23]
Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu, and Manixh Karir, "A Survey of Botnet Technology and Defenses," in Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security, 2009
[24]
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna, "Your Botnet is My Botnet: Analysis of a Botnet Takeover," in Proceedings of CCS, November 2009
[25]
T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F. Freiling, "Measurements and mitigation of peer-to-peer-based botnets: A case study on stormworm," in Proc. 1st Usenix Workshop on Large-scale Exploits and Emergent Threats, San Francisco, 2008
[26]
Ping Wang, Baber Aslam, and Cliff C. Zou, "Peer-to-Peer Botnets," in Handbook of Information and Communication Security, Springer, 2010
[27]
Julian B. Grizzard, Vikram Sharma, Chris Nunnery, Brent Byunghoon Kang, and David Dagon, "Peer-to-peer botnets: overview and case study," in Proceedings of the HotBot, April 10, 2007
[28]
Ping Wang, Sherri Sparks, and Cliff C. Zou, "An Advanced Hybrid Peer-to-Peer Botnet," IEEE Transactions on Dependable and Secure Computing, April-June 2010
[29]
S. Stankovic and D. Simic, "Defense Strategies Against Modern Botnets", International Journal of Computer Science and Information Security, Vol. 2, No. 1, 2009
[30]
N. Inaelli and A. Hackworth, "Botnets as a Vehicle for Online Crime", in Proceedings of 18th Anunual First Conference, Jun 2006
[31]
"Winning the Botnet Wars", Technewsworld, Dec 10, 2009
[32]
"Botnets and Hackers and Spam", Federal Trade Commision, Jun 2007
[33]
N. Ierace, C. Urrutia, and R. Bassett, "Intrusion Prevention Systems", Ubiquity, Jun 2005
[34]
"MAAWG Best Practices for the Use of a Walled Garden", Messaging Anti-Abuse Working Group, Sep 2007
[35]
G. Gu, J. Zhang and Wenke Lee, "BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic", in Proceedings of NDSS, 2008
[36]
J. Lie, Y. Xiao, K. Ghaboosi, H Deng and J. Zhang, "Botnet: Classification, Attacks, Detection, Tracing and Preventive Measures", EURASIP Journal on Wireless Comunications and Networking, 2009
[37]
L. Spitzner, "The Honeynet Project: Trapping the Hackers", IEEE Security & Privacy, 2003
[38]
B. McCarty, "Botnets: Big and Bigger", IEEE Security & Privacy, 2003
[39]
P. Bächer, T. Holz, M. Kötter and G. Wicherski, "Know your Enemy: Tracking Botnets", http://old.honeynet.org/papers/bots/, Mar 13, 2005
[40]
http://www.send-safe.com/honeypot-hunter.htm
[41]
E. Cooke, F. Jahanian, and D. McPherson, "The zombie roundup: understanding, detecting, and disrupting botnets", in Proceedings of Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI '05), 2005
[42]
J. R. Binkley and S. Singh, "An Algorithm for Anomaly-based Botnet Detection", in Proceedings of Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI '06), 2006
[43]
http://en.wikipedia.org/wiki/Botnet
[44]
"Microsoft users Legal System to Combat Botnet", PCWorld, Feb 25, 2010
[45]
"Spanish Police Take Down Massive Mariposa Botnet", PCWorld, Mar 02, 2010

Cited By

View all
  • (2020)Compiling and Analyzing Open Source Malware for Research Purposes2020 International Conference on Software Security and Assurance (ICSSA)10.1109/ICSSA51305.2020.00013(32-37)Online publication date: Oct-2020
  • (2019)On Security Threats of Botnets to Cyber Systems2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)10.1109/SPIN.2019.8711780(176-183)Online publication date: Mar-2019
  • (2019)BOTNETCyber Security: The Lifeline of Information and Communication Technology10.1007/978-3-030-31703-4_4(43-65)Online publication date: 18-Oct-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
iiWAS '10: Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
November 2010
895 pages
ISBN:9781450304214
DOI:10.1145/1967486

Sponsors

  • IIWAS: International Organization for Information Integration
  • Web-b: Web-b

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bot
  2. botnet
  3. malware
  4. security

Qualifiers

  • Keynote

Conference

iiWAS '10
Sponsor:
  • IIWAS
  • Web-b

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Compiling and Analyzing Open Source Malware for Research Purposes2020 International Conference on Software Security and Assurance (ICSSA)10.1109/ICSSA51305.2020.00013(32-37)Online publication date: Oct-2020
  • (2019)On Security Threats of Botnets to Cyber Systems2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)10.1109/SPIN.2019.8711780(176-183)Online publication date: Mar-2019
  • (2019)BOTNETCyber Security: The Lifeline of Information and Communication Technology10.1007/978-3-030-31703-4_4(43-65)Online publication date: 18-Oct-2019
  • (2011)Botnets: threats and responsesInternational Journal of Web Information Systems10.1108/174400811111256357:1(6-17)Online publication date: 5-Apr-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media