Botnet command and control techniques

被引:4
|
作者
Heron, Simon [1 ]
机构
[1] Network Box (UK) Defence Systems
关键词
Command and control systems;
D O I
10.1016/S1353-4858(07)70045-4
中图分类号
学科分类号
摘要
引用
收藏
页码:13 / 16
相关论文
共 50 条
  • [31] BotDet: A System for Real Time Botnet Command and Control Traffic Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Baker, Thar
    Jabbar, Sohail
    Khalid, Shehzad
    Jaf, Sardar
    IEEE ACCESS, 2018, 6 : 38947 - 38958
  • [32] Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection
    Seo, Ilju
    Lee, Heejo
    Han, Seung Chul
    COMPUTERS & SECURITY, 2014, 46 : 141 - 153
  • [33] CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
    Dietrich, Christian J.
    Rossow, Christian
    Pohlmann, Norbert
    COMPUTER NETWORKS, 2013, 57 (02) : 475 - 486
  • [34] Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
    Kartaltepe, Erhan J.
    Morales, Jose Andre
    Xu, Shouhuai
    Sandhu, Ravi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 511 - +
  • [35] Research on cloud-based traffic adaptive command and control method for mobile botnet
    Chen, Wei
    Zhou, Shi-Wen
    Yin, Cheng-Yu
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 32 - 38
  • [36] Botnet and Botnet Detection Techniques in Cyber realm
    Kaur, Navdeep
    Singh, Maninder
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 694 - 699
  • [37] DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis
    Bilge, Leyla
    Balzarotti, Davide
    Robertson, William
    Kirda, Engin
    Kruegel, Christopher
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 129 - 138
  • [38] Honeynet Based Botnet Detection Using Command Signatures
    Bhatia, J. S.
    Sehgal, R. K.
    Kumar, Sanjeev
    ADVANCES IN WIRELESS, MOBILE NETWORKS AND APPLICATIONS, 2011, 154 : 69 - 78
  • [39] Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels
    Sood, Aditya K.
    Zeadally, Sherali
    Bansal, Rohit
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) : 22 - 28
  • [40] Discovering the Botnet Detection Techniques
    Rahim, Aneel
    bin Muhaya, Fahad T.
    SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY, 2010, 122 : 231 - 235