Difference between revisions of "Botnet: classification, attacks, detection, tracing, and preventive measures"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Botnet=Phatbot, Agobot, SDBot, SpyBot, Forbot, Xtrembot, Netdevil, UrBot, RBot, UrXBot | |||
|Year=2009 | |||
|Link=http://www.hindawi.com/journals/wcn/2009/692654/ | |Link=http://www.hindawi.com/journals/wcn/2009/692654/ | ||
|Author=Jing Liu, Yang Xiao, Hongmei Deng, Jingyuan Zhang | |Author=Jing Liu, Yang Xiao, Hongmei Deng, Jingyuan Zhang | ||
|Abstract=Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges. | |||
|NomRevue=EURASIP Journal on Wireless Communications and Networking | |NomRevue=EURASIP Journal on Wireless Communications and Networking | ||
|Numéro=Volume 2009 (2009) | |Numéro=Volume 2009 (2009) | ||
|Editeur=Lehigh University. Bethlehem | |Editeur=Lehigh University. Bethlehem | ||
|Page=Article ID 692654 | |Page=Article ID 692654 | ||
}} | }} |
Revision as of 01:59, 1 February 2015
(Publication) Google search: [1]
Botnet: classification, attacks, detection, tracing, and preventive measures | |
---|---|
Botnet | Phatbot, Agobot, SDBot, SpyBot, Forbot, Xtrembot, Netdevil, UrBot, RBot, UrXBot |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2009 / |
Editor/Conference | |
Link | http://www.hindawi.com/journals/wcn/2009/692654/ (Archive copy) |
Author | Jing Liu, Yang Xiao, Hongmei Deng, Jingyuan Zhang |
Type |
Abstract
“ Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2009BFR423, editor = {}, author = {Jing Liu, Yang Xiao, Hongmei Deng, Jingyuan Zhang}, title = {Botnet: classification, attacks, detection, tracing, and preventive measures}, date = {02}, month = May, year = {2009}, howpublished = {\url{http://www.hindawi.com/journals/wcn/2009/692654/}}, }