2009
DOI: 10.1007/978-3-642-04444-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Automatically Generating Models for Botnet Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
65
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 98 publications
(66 citation statements)
references
References 13 publications
0
65
0
1
Order By: Relevance
“…Wurzinger et al's [43] approach, which identifies botnets that are under the influence of botmaster (malicious body) using network signatures by examining the response from a compromised host to a received command and by generating detection models. ProVex [44] is also a semantic-based approach which generates signatures to identify botnets that use encrypted command and control (C&C) systems after being given the keys and decryption routine employed by the malware using binary code reuse strategy, and is based on the research proposed by Caballero et al's approach [45].…”
Section: Related Workmentioning
confidence: 99%
“…Wurzinger et al's [43] approach, which identifies botnets that are under the influence of botmaster (malicious body) using network signatures by examining the response from a compromised host to a received command and by generating detection models. ProVex [44] is also a semantic-based approach which generates signatures to identify botnets that use encrypted command and control (C&C) systems after being given the keys and decryption routine employed by the malware using binary code reuse strategy, and is based on the research proposed by Caballero et al's approach [45].…”
Section: Related Workmentioning
confidence: 99%
“…This work focuses on the network behavior of malware, when they have to communicate with a computer outside the network like C&C communications, and the reason of these exchanges. Previous work that focused on other topics of malware network behavior have already been done about honeypots [3] or the correlation between malicious activity and previous instructions from a C&C server [16] [35]. A kind of communication is represented by the packets needed for a Denial of Service (DoS) attack; it is important to underline that these packets are different from the ones exchanged between a spyware and its master about the sensitive data on the infected machine.…”
Section: Related Workmentioning
confidence: 99%
“…They showed that the monitor was able to detect bots behind firewalls or NAT devices, achieving a broader coverage than others that actively crawl the network. Wurzinger et al [22] constructed network intrusion detection signatures to identify botmaster commands by examining bot binaries running in controlled environments. Their main observation is that changes in the network behaviors of a Plotter are indications of it having received commands from the botmaster.…”
Section: Related Workmentioning
confidence: 99%