A taxonomy of Botnet detection techniques
Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastr...
Saved in:
| Published in | 2010 3rd IEEE International Conference on Computer Science and Information Technology Vol. 2; pp. 158 - 162 |
|---|---|
| Main Authors | , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.07.2010
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781424455379 1424455375 |
| DOI | 10.1109/ICCSIT.2010.5563555 |
Cover
| Abstract | Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They provide a distributed platform for several illegal activities such as launching distributed denial of service (DDOS) attacks against critical targets, malware distribution, phishing, and click fraud. Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols (e.g., IRC, HTTP) and structures (e.g., centralized), and can become ineffective as Botnets change their structure and C&C techniques. The detection of Botnet has been a major research topic in recent years. Different techniques and approaches have been proposed for detection and tracking of Botnet. This survey classifies Botnet detection techniques into two approaches. One approach is based on setting up honeynets and another approach is based on Intrusion Detection System( IDS) which has been categorized into signature-based and anomaly-based detection techniques. |
|---|---|
| AbstractList | Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They provide a distributed platform for several illegal activities such as launching distributed denial of service (DDOS) attacks against critical targets, malware distribution, phishing, and click fraud. Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols (e.g., IRC, HTTP) and structures (e.g., centralized), and can become ineffective as Botnets change their structure and C&C techniques. The detection of Botnet has been a major research topic in recent years. Different techniques and approaches have been proposed for detection and tracking of Botnet. This survey classifies Botnet detection techniques into two approaches. One approach is based on setting up honeynets and another approach is based on Intrusion Detection System( IDS) which has been categorized into signature-based and anomaly-based detection techniques. |
| Author | Shooshtari, M J Z Safari, M Zeidanloo, H R Amoli, P V Zamani, M |
| Author_xml | – sequence: 1 givenname: H R surname: Zeidanloo fullname: Zeidanloo, H R email: h_rouhani@hotmail.com organization: Fac. of Comput. Sci. & Inf. Syst., Univ. of Technol. Malaysia, Kuala Lumpur, Malaysia – sequence: 2 givenname: M J Z surname: Shooshtari fullname: Shooshtari, M J Z email: mohammadjorg@yahoo.com organization: Fac. of Comput. Sci. & Inf. Syst., Univ. of Technol. Malaysia, Kuala Lumpur, Malaysia – sequence: 3 givenname: P V surname: Amoli fullname: Amoli, P V email: vahdani@gmail.com organization: Fac. of Comput. Sci. & Inf. Syst., Univ. of Technol. Malaysia, Kuala Lumpur, Malaysia – sequence: 4 givenname: M surname: Safari fullname: Safari, M email: m.safri81@gmail.com organization: Ind. Eng. Dept., AmirKabir Univ. of Technol., Tehran, Iran – sequence: 5 givenname: M surname: Zamani fullname: Zamani, M email: zmazdak2@siswa.utm.my organization: Ind. Eng. Dept., AmirKabir Univ. of Technol., Tehran, Iran |
| BookMark | eNpNjztPwzAUhY2gErTkF3TJypDi60fsO5aIR6RKDJS5iuMbYURtaIxE_z2R6MBZPp1vONKZs4uYIjG2BL4C4HjbNs1Lu10JPgmta6m1PmMFGgtKKKW14nj-v0uDMzYXnCNKK5W4ZMU4vvMpSgttxRW7WZe5-0kx7Y9lGsq7lCPl0lOmPocUy4lvMXx903jNZkP3MVJx4oK9Ptxvm6dq8_zYNutNFcDoXIHpexichXroUALWDjyi9eQlCs_REzhnlbOGExpwHSnplB0sCK-N43LBln-7gYh2n4ew7w7H3emt_AWQTUcl |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICCSIT.2010.5563555 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore Digital Library IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781424455409 9781424455393 1424455405 1424455391 |
| EndPage | 162 |
| ExternalDocumentID | 5563555 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i175t-17cc1fb816fa93196b1d998ded392d09de1bb84b870e971bae43b48f812d57b03 |
| IEDL.DBID | RIE |
| ISBN | 9781424455379 1424455375 |
| IngestDate | Wed Aug 27 02:53:13 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009938342 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-17cc1fb816fa93196b1d998ded392d09de1bb84b870e971bae43b48f812d57b03 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_5563555 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-July |
| PublicationDateYYYYMMDD | 2010-07-01 |
| PublicationDate_xml | – month: 07 year: 2010 text: 2010-July |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 3rd IEEE International Conference on Computer Science and Information Technology |
| PublicationTitleAbbrev | ICCSIT |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000452582 |
| Score | 1.6773034 |
| Snippet | Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 158 |
| SubjectTerms | bot Botnet Computational modeling Computers Cryptography malicious activities Monitoring P2P patterns |
| Title | A taxonomy of Botnet detection techniques |
| URI | https://ieeexplore.ieee.org/document/5563555 |
| Volume | 2 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwGA3bTp5UNvE3OXgR7NasSZoedSibMBHcYLfRL_kKIrSiGYh_vUnaVRQP3pIcwhdC8vIl770QclFgopUSOoolmIi7WCNwW6XLUkAqUJxjYBPOH-R0ye9XYtUhV60WBhED-QyHvhje8k2lN_6qbOTNrIQQXdJNlay1Wu19ircGF2q81W4JkaRia-nU1LPGdYjF2Wg2mTzNFjW1q-n2x_8qAV7udsl8G1jNKnkZbiwM9ecvz8b_Rr5HBt9CPvrYQtQ-6WDZJ5fX1OYfQcxAq4LeVLZESw3awMoqaWvr-j4gy7vbxWQaNT8mRM_uGGAjlmrNClBMFnnmFxcw4_Ipg8Ydg0ycGWTgJgDcIsUsZZAjT4CrwqG8ESnEyQHplVWJh4RqWYxlmkOCwnDUDrRcZsNQMglgxjo7In0_zPVrbYqxbkZ4_HfzCdmpn909z_WU9OzbBs8cmls4D9P4BfGemow |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedCTyib-tgcvgt2aNUnbow7HptsQ3GC30Ze8ggxa0QzEv970xyqKB29JDuGFkHx5yfd9AbhKyFdhKJTrSdQut7G6aLdKm6WgDDHknAo24WQqh3P-sBCLBtzUWhgiKshn1MmLxVu-ztQ6vyrr5mZWQogt2Bacc1GqteobldwcXIS9jXpLCD8QG1Onqh5VvkPMi7qjfv95NCvJXVXHP35YKQBmsAeTTWglr2TVWRvsqM9fro3_jX0f2t9SPuepBqkDaFDagutbx8QfhZzByRLnLjMpGUeTKXhZqVMbu763YT64n_WHbvVngvtiDwLGZYFSLMGQySSO8uWFTNuMSpO2ByHtRZoY2ilAu0wpChjGxH3kYWJxXosAPf8QmmmW0hE4SiY9GcTok9CclIUtm9swkkwi6p6KjqGVD3P5WtpiLKsRnvzdfAk7w9lkvByPpo-nsFs-wues1zNomrc1nVtsN3hRTOkXQs2d2Q |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+3rd+IEEE+International+Conference+on+Computer+Science+and+Information+Technology&rft.atitle=A+taxonomy+of+Botnet+detection+techniques&rft.au=Zeidanloo%2C+H+R&rft.au=Shooshtari%2C+M+J+Z&rft.au=Amoli%2C+P+V&rft.au=Safari%2C+M&rft.date=2010-07-01&rft.pub=IEEE&rft.isbn=9781424455379&rft.volume=2&rft.spage=158&rft.epage=162&rft_id=info:doi/10.1109%2FICCSIT.2010.5563555&rft.externalDocID=5563555 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424455379/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424455379/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424455379/sc.gif&client=summon&freeimage=true |