2011
DOI: 10.1016/j.physa.2010.10.001
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and analyzing of botnet interactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(26 citation statements)
references
References 14 publications
0
26
0
Order By: Relevance
“…For instance, similarities in the underlying C&C communication protocols exist, which includes Internet Relay Chat, Hypertext Transfer Protocol (HTTP) [18], and Peer-to-Peer (P2P) networks [24]. In addition to these, mechanisms based on Short Messaging System (SMS) [6][25] [26], Bluetooth [27], or Multimedia Messaging System (MMS) [28] have also emerged to disseminate and control botnet traffic. Fig.…”
Section: Architecturementioning
confidence: 99%
“…For instance, similarities in the underlying C&C communication protocols exist, which includes Internet Relay Chat, Hypertext Transfer Protocol (HTTP) [18], and Peer-to-Peer (P2P) networks [24]. In addition to these, mechanisms based on Short Messaging System (SMS) [6][25] [26], Bluetooth [27], or Multimedia Messaging System (MMS) [28] have also emerged to disseminate and control botnet traffic. Fig.…”
Section: Architecturementioning
confidence: 99%
“…The second compound matrix [2] of the Jacobin matrix can be calculated as follows (see [10,11]): [2]…”
Section: Theorem 4 * Is Uniquely Globally Asymptotically Stable Ifmentioning
confidence: 99%
“…And they are residing by erasing data, damaging files, or modifying the normal operation. Due to the high similarity between computer virus and biological virus [1], various computer virus propagation models are proposed [2][3][4]. This dynamical modeling of the spread process of computer virus is an effective approach to the understanding of the behavior of computer viruses because on this basis, some effective measures can be posed to prevent infection.…”
Section: Introductionmentioning
confidence: 99%
“…By now, current botnet detection research is mainly based on network behaviors [5,6,7,8,9,10,11,12]. Few people have studied how to detect botnets based on host behaviors [13].…”
Section: Related Workmentioning
confidence: 99%