2018
DOI: 10.1007/978-3-030-00470-5_24
|View full text |Cite
|
Sign up to set email alerts
|

Next Generation P2P Botnets: Monitoring Under Adverse Conditions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Karuppayah et al 59 studied the detection of crawlers in botnets and conducted experimental evaluations in real‐world botnets. Böck et al 60 pointed out the possible challenges in botnet detection and shared some new ideas. Vormayr et al 61 summarized the communication topologies of various botnets that have ever appeared.…”
Section: Related Workmentioning
confidence: 99%
“…Karuppayah et al 59 studied the detection of crawlers in botnets and conducted experimental evaluations in real‐world botnets. Böck et al 60 pointed out the possible challenges in botnet detection and shared some new ideas. Vormayr et al 61 summarized the communication topologies of various botnets that have ever appeared.…”
Section: Related Workmentioning
confidence: 99%
“…If unstructured P2P botnets have power‐law degree distribution, then researchers use the scale‐free model for their analysis. As in most of the unstructured botnets, the connections of each bot are usually limited to a certain number, and even the number of peers in a peer‐list is fixed [12], so they are random networks.…”
Section: P2p Botnetmentioning
confidence: 99%
“…The reasoning behind this argument is well studied [ZLK10], and can be summarized in the following: detectors, e.g., anomaly detection algorithms, can be improved by enhancing the input data, alert correlation is more effective when the data volume increases, a number of attacks, e.g., malware spreading, can be contained even before seen locally when they are anticipated as a result of collaboration. For instance, Böck et al [BVMK18] recently showed that correlation of data from different sensors is necessary to enumerate advanced P2P botnets. Collaborative Intrusion Detection Systems (CIDSs) further formulate the aforesaid idea by implementing it in the form of a system [VKMF15].…”
Section: Collaborative Security and Cidssmentioning
confidence: 99%