A taxonomy of Botnet detection techniques

Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastr...

Full description

Saved in:
Bibliographic Details
Published in2010 3rd IEEE International Conference on Computer Science and Information Technology Vol. 2; pp. 158 - 162
Main Authors Zeidanloo, H R, Shooshtari, M J Z, Amoli, P V, Safari, M, Zamani, M
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2010
Subjects
Online AccessGet full text
ISBN9781424455379
1424455375
DOI10.1109/ICCSIT.2010.5563555

Cover

Abstract Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They provide a distributed platform for several illegal activities such as launching distributed denial of service (DDOS) attacks against critical targets, malware distribution, phishing, and click fraud. Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols (e.g., IRC, HTTP) and structures (e.g., centralized), and can become ineffective as Botnets change their structure and C&C techniques. The detection of Botnet has been a major research topic in recent years. Different techniques and approaches have been proposed for detection and tracking of Botnet. This survey classifies Botnet detection techniques into two approaches. One approach is based on setting up honeynets and another approach is based on Intrusion Detection System( IDS) which has been categorized into signature-based and anomaly-based detection techniques.
AbstractList Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They provide a distributed platform for several illegal activities such as launching distributed denial of service (DDOS) attacks against critical targets, malware distribution, phishing, and click fraud. Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols (e.g., IRC, HTTP) and structures (e.g., centralized), and can become ineffective as Botnets change their structure and C&C techniques. The detection of Botnet has been a major research topic in recent years. Different techniques and approaches have been proposed for detection and tracking of Botnet. This survey classifies Botnet detection techniques into two approaches. One approach is based on setting up honeynets and another approach is based on Intrusion Detection System( IDS) which has been categorized into signature-based and anomaly-based detection techniques.
Author Shooshtari, M J Z
Safari, M
Zeidanloo, H R
Amoli, P V
Zamani, M
Author_xml – sequence: 1
  givenname: H R
  surname: Zeidanloo
  fullname: Zeidanloo, H R
  email: h_rouhani@hotmail.com
  organization: Fac. of Comput. Sci. & Inf. Syst., Univ. of Technol. Malaysia, Kuala Lumpur, Malaysia
– sequence: 2
  givenname: M J Z
  surname: Shooshtari
  fullname: Shooshtari, M J Z
  email: mohammadjorg@yahoo.com
  organization: Fac. of Comput. Sci. & Inf. Syst., Univ. of Technol. Malaysia, Kuala Lumpur, Malaysia
– sequence: 3
  givenname: P V
  surname: Amoli
  fullname: Amoli, P V
  email: vahdani@gmail.com
  organization: Fac. of Comput. Sci. & Inf. Syst., Univ. of Technol. Malaysia, Kuala Lumpur, Malaysia
– sequence: 4
  givenname: M
  surname: Safari
  fullname: Safari, M
  email: m.safri81@gmail.com
  organization: Ind. Eng. Dept., AmirKabir Univ. of Technol., Tehran, Iran
– sequence: 5
  givenname: M
  surname: Zamani
  fullname: Zamani, M
  email: zmazdak2@siswa.utm.my
  organization: Ind. Eng. Dept., AmirKabir Univ. of Technol., Tehran, Iran
BookMark eNpNjztPwzAUhY2gErTkF3TJypDi60fsO5aIR6RKDJS5iuMbYURtaIxE_z2R6MBZPp1vONKZs4uYIjG2BL4C4HjbNs1Lu10JPgmta6m1PmMFGgtKKKW14nj-v0uDMzYXnCNKK5W4ZMU4vvMpSgttxRW7WZe5-0kx7Y9lGsq7lCPl0lOmPocUy4lvMXx903jNZkP3MVJx4oK9Ptxvm6dq8_zYNutNFcDoXIHpexichXroUALWDjyi9eQlCs_REzhnlbOGExpwHSnplB0sCK-N43LBln-7gYh2n4ew7w7H3emt_AWQTUcl
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCSIT.2010.5563555
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781424455409
9781424455393
1424455405
1424455391
EndPage 162
ExternalDocumentID 5563555
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-17cc1fb816fa93196b1d998ded392d09de1bb84b870e971bae43b48f812d57b03
IEDL.DBID RIE
ISBN 9781424455379
1424455375
IngestDate Wed Aug 27 02:53:13 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009938342
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-17cc1fb816fa93196b1d998ded392d09de1bb84b870e971bae43b48f812d57b03
PageCount 5
ParticipantIDs ieee_primary_5563555
PublicationCentury 2000
PublicationDate 2010-July
PublicationDateYYYYMMDD 2010-07-01
PublicationDate_xml – month: 07
  year: 2010
  text: 2010-July
PublicationDecade 2010
PublicationTitle 2010 3rd IEEE International Conference on Computer Science and Information Technology
PublicationTitleAbbrev ICCSIT
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452582
Score 1.6773034
Snippet Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of...
SourceID ieee
SourceType Publisher
StartPage 158
SubjectTerms bot
Botnet
Computational modeling
Computers
Cryptography
malicious activities
Monitoring
P2P
patterns
Title A taxonomy of Botnet detection techniques
URI https://ieeexplore.ieee.org/document/5563555
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwGA3bTp5UNvE3OXgR7NasSZoedSibMBHcYLfRL_kKIrSiGYh_vUnaVRQP3pIcwhdC8vIl770QclFgopUSOoolmIi7WCNwW6XLUkAqUJxjYBPOH-R0ye9XYtUhV60WBhED-QyHvhje8k2lN_6qbOTNrIQQXdJNlay1Wu19ircGF2q81W4JkaRia-nU1LPGdYjF2Wg2mTzNFjW1q-n2x_8qAV7udsl8G1jNKnkZbiwM9ecvz8b_Rr5HBt9CPvrYQtQ-6WDZJ5fX1OYfQcxAq4LeVLZESw3awMoqaWvr-j4gy7vbxWQaNT8mRM_uGGAjlmrNClBMFnnmFxcw4_Ipg8Ydg0ycGWTgJgDcIsUsZZAjT4CrwqG8ESnEyQHplVWJh4RqWYxlmkOCwnDUDrRcZsNQMglgxjo7In0_zPVrbYqxbkZ4_HfzCdmpn909z_WU9OzbBs8cmls4D9P4BfGemow
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedCTyib-tgcvgt2aNUnbow7HptsQ3GC30Ze8ggxa0QzEv970xyqKB29JDuGFkHx5yfd9AbhKyFdhKJTrSdQut7G6aLdKm6WgDDHknAo24WQqh3P-sBCLBtzUWhgiKshn1MmLxVu-ztQ6vyrr5mZWQogt2Bacc1GqteobldwcXIS9jXpLCD8QG1Onqh5VvkPMi7qjfv95NCvJXVXHP35YKQBmsAeTTWglr2TVWRvsqM9fro3_jX0f2t9SPuepBqkDaFDagutbx8QfhZzByRLnLjMpGUeTKXhZqVMbu763YT64n_WHbvVngvtiDwLGZYFSLMGQySSO8uWFTNuMSpO2ByHtRZoY2ilAu0wpChjGxH3kYWJxXosAPf8QmmmW0hE4SiY9GcTok9CclIUtm9swkkwi6p6KjqGVD3P5WtpiLKsRnvzdfAk7w9lkvByPpo-nsFs-wues1zNomrc1nVtsN3hRTOkXQs2d2Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+3rd+IEEE+International+Conference+on+Computer+Science+and+Information+Technology&rft.atitle=A+taxonomy+of+Botnet+detection+techniques&rft.au=Zeidanloo%2C+H+R&rft.au=Shooshtari%2C+M+J+Z&rft.au=Amoli%2C+P+V&rft.au=Safari%2C+M&rft.date=2010-07-01&rft.pub=IEEE&rft.isbn=9781424455379&rft.volume=2&rft.spage=158&rft.epage=162&rft_id=info:doi/10.1109%2FICCSIT.2010.5563555&rft.externalDocID=5563555
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424455379/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424455379/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424455379/sc.gif&client=summon&freeimage=true