Abstract
Botnet is a network of compromised computers. It just fellow the master slave concept. Bots are comprised computers and do the tasks what ever their master orders them. Internet Relay Chat (IRC) is used for the communication between the master and bots. Information is also encrypted to avoid the effect of third party. In this paper we discuss the Botnets detection techniques and comparative analysis of these techniques on the basis of DNS query, History data and group activity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bailey, M., Cooke, B., Jahanian, F., Xu, Y.: A Survey of Botnet Technology and Defenses. In: Cybersecurity Applications & Technology Conference for Homeland Security. IEEE, Los Alamitos (2009)
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M.: Your Botnet is My Botnet Analysis of a Botnet Takeover. ACM, New York (2009)
Leonard, J., Xu, S., Sandhu, R.: A Framework for Understanding Botnets. In: International Conference on Availability, Reliability and Security. IEEE, Los Alamitos (2009)
Collins, M.P., Shimeall, T.J., Kadane, J.B.: Using Uncleanliness to Predict Future Botnet Addresses. In: IMC 2007. ACM, New York (2007)
Pathak, A., Qian, F., Hu, C., Mao, M., Ranjan, S.: Botnet Spam Campaigns Can Be Long Lasting Evidence, Implications, and Analysis. ACM, New York (2009)
Zhu, Z., Lu, G.: Botnet Research Survey. In: Annual IEEE International Computer Software and Applications Conference. IEEE, Los Alamitos (2008)
Feily, M., Shahrestani, A.: A Survey of Botnet and Botnet Detection. In: Third International Conference on Emerging Security Information, Systems and Technologies. IEEE, Los Alamitos (2009)
Li, C., Jiang, W., Zou, X.: Botnet: Survey and Case Study. In: Fourth International Conference on Innovative Computing, Information and Control. IEEE, Los Alamitos (2009)
Govil, J., Govil, J.: Criminology of BotNets and their Detection and Defense Methods. IEEE, Los Alamitos (2007)
Jackson, A.W., Lapsley, D., Jones, C., Zatko, M., Golubitsky, C., Strayer, W.T.: SLINGbot A System for Live Investigation of Next Generation Botnets. In: Cybersecurity Applications & Technology Conference For Homeland Security. IEEE, Los Alamitos (2009)
Choi, H., Lee, H., Kim, H.: BotGAD: Detecting Botnets by Capturing Group Activities in Network Traffic. In: COMSWARE, Dublin, Ireland (2009)
Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: 17th USENIX Security Symposium (2008)
Yu, F., Xie, Y., Ke, Q.: SBotMiner: Large Scale Search Bot Detection. In: WSDM, February 4-6. ACM, USA (2010)
VillamarÃn-Salomón, R., Brustoloni, J.: Bayesian Bot Detection Based on DNS Traffic Similarity. In: SAC 2009, March 8-12 (2009)
Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) (2008)
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming Botnets: Signatures and Characteristics. In: SIGCOMM 2008, August 17-22 (2008)
Lu, W., Tavallaee, M., Ghorbani, A.: Automatic Discovery of Botnet Communities on Large-Scale Communication Networks. In: ASIACCS 2009, March 10-12 (2009)
Chang, S., Daniels, T.: P2P Botnet Detection using Behavior Clustering & Statistical Tests. In: AISec 2009, November 9. ACM, New York (2009)
Muhammad, M., Gao, J., Khan, L.: Peer to Peer Botnet Detection for Cyber-Security: A Data Mining Approach. In: CSIIRW 2008, Oak Ridge, Tennessee, USA (2008)
Liu, L., Chen, S., Yan, G., Zhang, Z.: BotTracer: Execution-based Bot-like Malware Detection. LNCS. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rahim, A., bin Muhaya, F.T. (2010). Discovering the Botnet Detection Techniques. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-17610-4_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17609-8
Online ISBN: 978-3-642-17610-4
eBook Packages: Computer ScienceComputer Science (R0)