2018 International Conference on Communication and Signal Processing (ICCSP) 2018
DOI: 10.1109/iccsp.2018.8524529
|View full text |Cite
|
Sign up to set email alerts
|

Botnet and P2P Botnet Detection Strategies: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The most popular types of malware seek to retrieve and maintain communication on a regular basis with Command and Control servers (C&C servers) which are under the control of a malicious user, so that they can collect, transfer information, and upgrades to the infected devices (bots) [17], [18]. This communication is usually done using hardcoded addresses, or a pool of addresses controlled by the creator of the malware or network.Modern programming techniques enable malware developers to use thousands of alternating IP addresses to communicate with C&C servers.…”
Section: Demystifying Malicious Trafficmentioning
confidence: 99%
“…The most popular types of malware seek to retrieve and maintain communication on a regular basis with Command and Control servers (C&C servers) which are under the control of a malicious user, so that they can collect, transfer information, and upgrades to the infected devices (bots) [17], [18]. This communication is usually done using hardcoded addresses, or a pool of addresses controlled by the creator of the malware or network.Modern programming techniques enable malware developers to use thousands of alternating IP addresses to communicate with C&C servers.…”
Section: Demystifying Malicious Trafficmentioning
confidence: 99%
“…Figure 4 shows the utilization of CPU after the malicious activity. According to the literature review [25]- [27], whenever your device become a part of Bot network the Bot-master will boost the device and network traffic flow. After analyzing the literature review and performing multiple experiments on devices, we found that when a device is not infected, CPU utilization is between 20% to 40%, while when a device is a part of bot network and they are following orders, the CPU utilization is >= 70%.…”
Section: Results and Discussion On Host Behaviour Analysis And Identi...mentioning
confidence: 99%
“…Botnet communications are classified into (Dhayal and Kumar, 2018): 1) Centralized botnet (i.e., the client-server model) 2) Decentralized Botnet (i.e., peer to peer communication model), and 3) Hybrid model For instance, Mirai, Muhstik, Toraii, Hakai, Trojan, Gagfyt, Okiru, Kenjiro, Hajime, IRCBot, Hide and seek botnets are the most common botnet attacks (Hegde et al, 2020).…”
Section: B Botnet Evasion Attacksmentioning
confidence: 99%