A Survey on Latest Botnet Attack and Defense

Paper


Zhang, Lei, Yu, Shui, Wu, Di and Watters, Paul. 2011. "A Survey on Latest Botnet Attack and Defense ." 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 China. https://doi.org/10.1109/TrustCom.2011.11
Paper/Presentation Title

A Survey on Latest Botnet Attack and Defense

Presentation TypePaper
AuthorsZhang, Lei, Yu, Shui, Wu, Di and Watters, Paul
Journal or Proceedings TitleProceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011)
Number of Pages53-60
Year2011
Place of PublicationChina
ISBN9781457721359
Digital Object Identifier (DOI)https://doi.org/10.1109/TrustCom.2011.11
Web Address (URL) of Paperhttps://ieeexplore.ieee.org/abstract/document/6120803
Web Address (URL) of Conference Proceedingshttps://ieeexplore.ieee.org/xpl/conhome/6120120/proceeding
Conference/Event10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011)
Event Details
10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011)
Parent
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Delivery
In person
Event Date
16 to end of 18 Nov 2011
Event Location
Changsha, China
Abstract

A botnet is a group of compromised computers, which are remotely controlled by hackers to launch various network attacks, such as DDoS attack and information phishing. Botnet has become a popular and productive tool behind many cyber attacks. Recently, the owners of some botnets, such as storm worm, torpig and conflicker, are employing fluxing techniques to evade detection. Therefore, the understanding of their fluxing tricks is critical to the success of defending from botnet attacks. Motivated by this, we survey the latest botnet attacks and defenses in this paper. We begin with introducing the principles of fast fluxing (FF) and domain fluxing (DF), and explain how these techniques were employed by botnet owners to fly under the radar. Furthermore, we investigate the state-of-art research on fluxing detection. We also compare and evaluate those fluxing detection methods by multiple criteria. Finally, we discuss future directions on fighting against botnet based attacks.

KeywordsSurvey; Botnet; Fast Fluxing; Domain Fluxing
ANZSRC Field of Research 20204604. Cybersecurity and privacy
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsDeakin University
University of Ballarat
Permalink -

https://research.usq.edu.au/item/z4y29/a-survey-on-latest-botnet-attack-and-defense

  • 4
    total views
  • 0
    total downloads
  • 4
    views this month
  • 0
    downloads this month

Export as

Related outputs

VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems
Zhang, Jiale, Liu, Yue, Wu, Di, Lou, Shuai, Chen, Bing and Yu, Shui. 2023. "VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems." Digital Communications and Networks. 9 (4), pp. 981-989. https://doi.org/10.1016/j.dcan.2022.05.010
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things
Wang, Nai, Chen, Junjun, Wu, Di, Yang, Wencheng, Xiang, Yong and Sajjanhar, Atul. 2023. "Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things." Journal of Information Security and Applications. 75. https://doi.org/10.1016/j.jisa.2023.103483
On addressing the imbalance problem: a correlated KNN approach for network traffic classification
Wu, Di, Chen, Xiao, Chen, Chao, Zhang, Jun, Xiang, Yang and Zhou, Wanlei. 2015. "On addressing the imbalance problem: a correlated KNN approach for network traffic classification." NSS 2014: 8th International Conference on Network and System Security. Xi'an, China 15 - 17 Oct 2014 Switzerland . Springer. https://doi.org/10.1007/978-3-319-11698-3_11
Detecting stepping stones by abnormal causality probability
Wen, Sheng, Wu, Di, Li, Ping, Xiang, Yang, Zhou, Wanlei and Wei, Guiyi. 2015. "Detecting stepping stones by abnormal causality probability." Security and Communication Networks. 8 (10), pp. 1831-1844. https://doi.org/10.1002/sec.1037