2010 3rd International Conference on Computer Science and Information Technology 2010
DOI: 10.1109/iccsit.2010.5563555
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of Botnet detection techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
44
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(49 citation statements)
references
References 11 publications
0
44
0
1
Order By: Relevance
“…In taxonomic terms, one approach to feature identification for botnet traffic is that of application-based systems [9]. This includes such techniques as graph theory, machine learning, decision trees, and data mining.…”
Section: B Features Of Anomalous Trafficmentioning
confidence: 99%
“…In taxonomic terms, one approach to feature identification for botnet traffic is that of application-based systems [9]. This includes such techniques as graph theory, machine learning, decision trees, and data mining.…”
Section: B Features Of Anomalous Trafficmentioning
confidence: 99%
“…Another pioneering research group in the field of botnet that implemented in real network scenarios is the Honeynet project [12]. However, honeynets are found to be mostly useful in understanding botnet technology and characteristics, but do not necessarily detect bot infection [13], [14].…”
Section: Related Workmentioning
confidence: 99%
“…They are networks of computers infected with malicious software that are connected over the Internet and can be instructed to carry out specific tasks -typically without the owners of those computers knowing it (Nadji et al, 2013;Plohmann et al, 2011;Whitehouse, 2014). Those who control botnets use them to steal identities, personal and financial information, illicitly gain access to bank accounts; distribute spam e-mails; shut down websites by overwhelming them with traffic (i.e., distributed denial-of-service or DDoS attacks); launch new custom-made botnets; or spread malware and ransomware (Cremonini & Riccardi, 2009;Plohmann et al, 2011;Zeidanloo et al, 2010).…”
Section: Introductionmentioning
confidence: 99%
“…The literature on botnet takedowns includes studies on accelerating the botnet takedown process (Nadji et al, 2013), employing botnet takedown methods (Dagon et. al., 2007;Freiling et al, 2005), minimizing botnet profitability (Tiirmaa-Klaar et al, 2013a), and detecting botnets (Dittrich, 2012;Nappa et al, 2010;Zeidanloo et al, 2010;Zhao et al, 2009). Studies have also looked at the managerial implications of botnet takedowns (Borrett et al, 2013;Scully, 2013), botnet lifecycles (Kok & Kurz, 2011), botnet types (Czosseck et al, 2011;Dagon et al, 2007), and practices to prevent and respond to botnet threats (Plohmann et al, 2011).…”
Section: Introductionmentioning
confidence: 99%