2011
DOI: 10.1016/j.comnet.2011.02.006
|View full text |Cite
|
Sign up to set email alerts
|

AntBot: Anti-pollution peer-to-peer botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 3 publications
0
10
1
Order By: Relevance
“…Hypothetical botnets proposed previously include Super-Botnet [27], Overbot [20], AntBot [30], and hybrid P2P botnets [28]. Our work differs from these work on two aspects.…”
Section: Related Workcontrasting
confidence: 43%
“…Hypothetical botnets proposed previously include Super-Botnet [27], Overbot [20], AntBot [30], and hybrid P2P botnets [28]. Our work differs from these work on two aspects.…”
Section: Related Workcontrasting
confidence: 43%
“…Therefore, we describe our results such that they cannot be directly applied by botmasters to harden their botnets. On a reassuring note, several detailed strategies for resilient P2P botnet designs have been publicly proposed, but we do not know of any real botnets that make use of these ideas [22,31,32,10]. We believe that the potential of our work to assist security experts justifies its publication.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Note that all recent P2P botnets have unstructured P2P protocols, that is, they use message gossiping to propagate information. To date, most academic work on P2P botnets has focused on structured architectures [22,31,32,10]. Bots in structured P2P botnets typically maintain a distributed hash table that is used to store and route commands.…”
Section: A P2p Botnet Characteristicsmentioning
confidence: 99%
See 1 more Smart Citation
“…A detailed description of Peacomm is presented by Ref [11]. They also investigate how to detect the Storm bot by using a BotHunte, which tracks the two-way communication flows between internal and external entities to find the infected host [12].…”
Section: Introductionmentioning
confidence: 99%