2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883429
|View full text |Cite
|
Sign up to set email alerts
|

On advanced monitoring in resilient and unstructured P2P botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…To avoid being removed from the NL of the bots, sensors must always be responsive when being probed by other bots. Moreover, the high availability of a sensor also directly influences its popularity [Kar+14], i.e., the number of bots that have the sensor in their NL. The more superpeers can verify the responsive-ness of a sensor at all time, the more bots will propagate the sensor's information to other bots.…”
Section: Sensor Nodesmentioning
confidence: 99%
See 2 more Smart Citations
“…To avoid being removed from the NL of the bots, sensors must always be responsive when being probed by other bots. Moreover, the high availability of a sensor also directly influences its popularity [Kar+14], i.e., the number of bots that have the sensor in their NL. The more superpeers can verify the responsive-ness of a sensor at all time, the more bots will propagate the sensor's information to other bots.…”
Section: Sensor Nodesmentioning
confidence: 99%
“…The evaluation of LICA is outlined below and the results have been published in [Kar+14]. First, the dataset utilized for evaluating LICA is discussed in Section 5.3.2.1.…”
Section: Evaluation Of the Less Invasive Crawling Algorithm (Lica)mentioning
confidence: 99%
See 1 more Smart Citation
“…In the methods of crawling [14, 17] and adding sensor nodes [14, 18] for collecting data have been discussed. In these methods, if the connection information or peer‐list of each node can be collected, then the graph can also be discovered.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, these botnets are often under particular surveillance of researchers and law enforcement agencies. As part of this monitoring activities, they are constantly crawled [3] and infiltrated by sensor nodes [4]. Crawling allows to retrieve a graph of all routable nodes in a botnet, but falls short in identifying nodes behind NAT.…”
Section: Introductionmentioning
confidence: 99%