2011 Conference on Network and Information Systems Security 2011
DOI: 10.1109/sar-ssi.2011.5931395
|View full text |Cite
|
Sign up to set email alerts
|

Botnets: Lifecycle and Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 41 publications
(16 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…Similarly, from the matrix of equation (20), all the eigenvalues have negative value, it follows that the botnet-endemic equilibrium is locally asymptotically stable for all the value of I .…”
Section: Botnet-endemic Equilibrium Stability Statementioning
confidence: 91%
See 2 more Smart Citations
“…Similarly, from the matrix of equation (20), all the eigenvalues have negative value, it follows that the botnet-endemic equilibrium is locally asymptotically stable for all the value of I .…”
Section: Botnet-endemic Equilibrium Stability Statementioning
confidence: 91%
“…Although botnets vary in sizes, from large-scale botnets that comprise of up to thousands of bots to a small scale botnets that comprise of hundreds of bots. Irrespective of its size, botnets are purposely created to carry out malicious activities in computer networks [20]. Considering the emergence of IoT botnet that utilizes Mirai malware, it has successfully shown that it is capable of powering some of the most powerful DDoS attacks that have been seen so far on the internet [4].…”
Section: Iot Botnet Propagationmentioning
confidence: 99%
See 1 more Smart Citation
“…As computer and network security threats are becoming more sophisticated as described in [1] and the number of service dependencies is increasing, optimal response decision is becoming a challenging task for security administrators. Applying appropriate countermeasures and defense strategy implies the deployment of proper network security policy enforcement while taking into account service dependencies and their different interactions.…”
Section: Introductionmentioning
confidence: 99%
“…Recent threats are, moreover, boosted by a myriad of infected network resources interconnected and controlled by unknown parties [2]. Network researchers have dedicated significant resources without reaching a comprehensive method to protect from all known forms of threats and their illegal activities [3]. Existing solutions to address these threats are mostly based on defense strategies.…”
Section: Introductionmentioning
confidence: 99%