Difference between revisions of "A study on botnet detection techniques"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Year=2012 | |Year=2012 | ||
|Date=2012-04 | |||
|Editor=International Journal of Scientific and Research Publications | |||
|Link=http://www.ijsrp.org/research_paper_apr2012/ijsrp-apr-2012-113.pdf | |Link=http://www.ijsrp.org/research_paper_apr2012/ijsrp-apr-2012-113.pdf | ||
|Author=Haritha.S. Nair, Vinodh Ewards S E | |Author=Haritha.S. Nair, Vinodh Ewards S E |
Latest revision as of 21:35, 5 August 2015
(Publication) Google search: [1]
A study on botnet detection techniques | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-04 |
Editor/Conference | International Journal of Scientific and Research Publications |
Link | http://www.ijsrp.org/research paper apr2012/ijsrp-apr-2012-113.pdf (Archive copy) |
Author | Haritha.S. Nair, Vinodh Ewards S E |
Type |
Abstract
“ A botnet is a network of compromised computers, termed bots that are used for malicious purposes. When a computer becomes compromised typically through a drive-by download, that has embedded malicious software, that computer becomes a part of a botnet. A bot typically runs hidden and uses
a covert channel to communicate with its command and control server. Botnets are controlled through protocols such as IRC and HTTP and in protocol-conforming manners. This makes the detection of botnet command and control a challenging problem. In this paper we discuss some of the botnet detection techniques and compare their advantages, disadvantages and features used in each technique.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1155, editor = {International Journal of Scientific and Research Publications}, author = {Haritha.S. Nair, Vinodh Ewards S E}, title = {A study on botnet detection techniques}, date = {01}, month = Apr, year = {2012}, howpublished = {\url{http://www.ijsrp.org/research_paper_apr2012/ijsrp-apr-2012-113.pdf}}, }