Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015
DOI: 10.1145/2714576.2714637
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Botnets in the Wild

Abstract: Today, botnets are still responsible for most large scale attacks on the Internet. Botnets are versatile, they remain the most powerful attack platform by constantly and continuously adopting new techniques and strategies in the arms race against various detection schemes, . Thus, it is essential to understand the latest of the botnets in a timely manner so that the insights can be utilized in developing more efficient defenses. In this work, we conduct a measurement study on some of the most active botnets on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(12 citation statements)
references
References 16 publications
0
11
0
1
Order By: Relevance
“…Despite many previous attempts at botnet measurement [13,10,22,15,6] and botnet detection [8,12,16,7,18,9,23], little attention has been paid to attack prediction. There are many different motivations for attack prediction, such as predicting the DDoS start time of the next expected attack from a particular botnet family [21], blocking hostile traffic in the future by measuring an indicator of how likely it is that the network will contain compromised hosts [11],…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Despite many previous attempts at botnet measurement [13,10,22,15,6] and botnet detection [8,12,16,7,18,9,23], little attention has been paid to attack prediction. There are many different motivations for attack prediction, such as predicting the DDoS start time of the next expected attack from a particular botnet family [21], blocking hostile traffic in the future by measuring an indicator of how likely it is that the network will contain compromised hosts [11],…”
Section: Related Workmentioning
confidence: 99%
“…A command and control (C2) server plays a significant role in a botnet: it sends commands to bots and receives outputs of bots while hiding a botmaster behind it. Despite many previous attempts at botnet measurement [13,10] and botnet detection [8,12,16,7], there is little research on predicting botnet attacks [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…With botnets quickly becoming the one of the most prevalent threats on the Internet, the key threat we are most concerned with is ultimately the botmaster who commands a herd of bots. To communicate with their bots, botmasters typically use domain names as its C2 channel because they are easy to acquire and recycle .…”
Section: System Overviewmentioning
confidence: 99%
“…Since their first appearance in 1990, botnets are considered one of the most serious threats against cyber-security. They are difficult to detect, hard to prevent, and their dimension can be as big as millions of infected machines worldwide [1].…”
Section: Introductionmentioning
confidence: 99%