2014
DOI: 10.1631/jzus.c1300242
|View full text |Cite
|
Sign up to set email alerts
|

Botnet detection techniques: review, future trends, and issues

Abstract: In recent years, the Internet has enabled access to widespread remote services in the distributed computing environment; however, integrity of data transmission in the distributed computing platform is hindered by a number of security issues. For instance, the botnet phenomenon is a prominent threat to Internet security, including the threat of malicious codes. The botnet phenomenon supports a wide range of criminal activities, including distributed denial of service (DDoS) attacks, click fraud, phishing, malw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
55
0
4

Year Published

2015
2015
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 102 publications
(59 citation statements)
references
References 105 publications
0
55
0
4
Order By: Relevance
“…The most important challenge in this regard is that these approaches are performed stealthy and can put at risk the security of the very hosts they inquire about to protect. If this offensive detection is discovered by the botmaster, there is a possibility that he/she will direct attack traffic to the responsible host(s) in defy defense [31].…”
Section: Future Trends and Challenges In Detecting Email Spamming Bmentioning
confidence: 99%
See 1 more Smart Citation
“…The most important challenge in this regard is that these approaches are performed stealthy and can put at risk the security of the very hosts they inquire about to protect. If this offensive detection is discovered by the botmaster, there is a possibility that he/she will direct attack traffic to the responsible host(s) in defy defense [31].…”
Section: Future Trends and Challenges In Detecting Email Spamming Bmentioning
confidence: 99%
“…Although the subject of botnet and botnet detection has gained a lot of attention and thus, there are several surveys on botnets [12][13][14] [20][21][22][23][24][25][26][27][28][29][30][31] in the literature but all of them cover the botnet problem in general, discussing different aspects like botnet phenomenon, botnet detection techniques and countermeasures. Also what was missing in these surveys is that all of these studies review only a few of all the research efforts intended only for detecting Email spamming botnets.…”
mentioning
confidence: 99%
“…Communication defense consists of detecting and identifying malicious communication between the infected bots and their C&C servers, and isolating the botnet by reporting and shutting down the detected C&C server. Researchers have proposed many detection techniques based on honeynets [7] and/or intrusion detection [8].…”
Section: Botnet Communication Phasementioning
confidence: 99%
“…Such systems search for network traffic anomalies, such as high network delays, high traffic throughput, and suspicious port usage [8].…”
Section: Botnet Communication Phasementioning
confidence: 99%
See 1 more Smart Citation