2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC) 2009
DOI: 10.1109/icicic.2009.127
|View full text |Cite
|
Sign up to set email alerts
|

Botnet: Survey and Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(34 citation statements)
references
References 3 publications
0
31
0
Order By: Relevance
“…After that, these bots were used to launch Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In April 1998, the GT-BOT [13] [124][125] was the first malicious Bot to be released.…”
Section: History Of Spamming Botnetsmentioning
confidence: 99%
See 1 more Smart Citation
“…After that, these bots were used to launch Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In April 1998, the GT-BOT [13] [124][125] was the first malicious Bot to be released.…”
Section: History Of Spamming Botnetsmentioning
confidence: 99%
“…Although the subject of botnet and botnet detection has gained a lot of attention and thus, there are several surveys on botnets [12][13][14] [20][21][22][23][24][25][26][27][28][29][30][31] in the literature but all of them cover the botnet problem in general, discussing different aspects like botnet phenomenon, botnet detection techniques and countermeasures. Also what was missing in these surveys is that all of these studies review only a few of all the research efforts intended only for detecting Email spamming botnets.…”
mentioning
confidence: 99%
“…For instance, the Phatbot botnet adopts a P2P based communication system that makes use of the WASTE protocol [21] and connects the agents using a Gnutella caching server [22].…”
Section: B P2p Based Modelsmentioning
confidence: 99%
“…Request permissions from Permissions@acm.org. CISR ' During two decades since the first botnet Eggdrop [10] in 1993, many botnets have been created, such as GTbot (2000), Zeus (2007), Torpig (2008), etc. There are active countermeasures against botnet infestations.…”
Section: Introductionmentioning
confidence: 99%