Difference between revisions of "Botnet: classification, attacks, detection, tracing, and preventive measures"
Jump to navigation
Jump to search
(Created page with "{{Publication}}") |
|||
Line 1: | Line 1: | ||
{{Publication}} | {{Publication | ||
|Link=http://www.hindawi.com/journals/wcn/2009/692654/ | |||
|Author=Jing Liu, Yang Xiao, Hongmei Deng, Jingyuan Zhang | |||
|NomRevue=EURASIP Journal on Wireless Communications and Networking | |||
|Numéro=Volume 2009 (2009) | |||
|Editeur=Lehigh University. Bethlehem | |||
|Year=2009 | |||
|Page=Article ID 692654 | |||
|Abstract=[[botnet|Botnets]] become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of [[botnet|botnets]] is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges. | |||
|Botnet=Phatbot, Agobot, SDBot, SpyBot, Forbot, Xtrembot, Netdevil, UrBot, RBot, UrXBot | |||
}} |
Revision as of 01:58, 1 February 2015
(Publication) Google search: [1]
Botnet: classification, attacks, detection, tracing, and preventive measures | |
---|---|
Botnet | Phatbot, Agobot, SDBot, SpyBot, Forbot, Xtrembot, Netdevil, UrBot, RBot, UrXBot |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2009 / |
Editor/Conference | |
Link | http://www.hindawi.com/journals/wcn/2009/692654/ (Archive copy) |
Author | Jing Liu, Yang Xiao, Hongmei Deng, Jingyuan Zhang |
Type |
Abstract
“ Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2009BFR423, editor = {}, author = {Jing Liu, Yang Xiao, Hongmei Deng, Jingyuan Zhang}, title = {Botnet: classification, attacks, detection, tracing, and preventive measures}, date = {02}, month = May, year = {2009}, howpublished = {\url{http://www.hindawi.com/journals/wcn/2009/692654/}}, }