Skip to main content

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 122))

Abstract

Botnet is a network of compromised computers. It just fellow the master slave concept. Bots are comprised computers and do the tasks what ever their master orders them. Internet Relay Chat (IRC) is used for the communication between the master and bots. Information is also encrypted to avoid the effect of third party. In this paper we discuss the Botnets detection techniques and comparative analysis of these techniques on the basis of DNS query, History data and group activity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bailey, M., Cooke, B., Jahanian, F., Xu, Y.: A Survey of Botnet Technology and Defenses. In: Cybersecurity Applications & Technology Conference for Homeland Security. IEEE, Los Alamitos (2009)

    Google Scholar 

  2. Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M.: Your Botnet is My Botnet Analysis of a Botnet Takeover. ACM, New York (2009)

    Google Scholar 

  3. Leonard, J., Xu, S., Sandhu, R.: A Framework for Understanding Botnets. In: International Conference on Availability, Reliability and Security. IEEE, Los Alamitos (2009)

    Google Scholar 

  4. Collins, M.P., Shimeall, T.J., Kadane, J.B.: Using Uncleanliness to Predict Future Botnet Addresses. In: IMC 2007. ACM, New York (2007)

    Google Scholar 

  5. Pathak, A., Qian, F., Hu, C., Mao, M., Ranjan, S.: Botnet Spam Campaigns Can Be Long Lasting Evidence, Implications, and Analysis. ACM, New York (2009)

    Google Scholar 

  6. Zhu, Z., Lu, G.: Botnet Research Survey. In: Annual IEEE International Computer Software and Applications Conference. IEEE, Los Alamitos (2008)

    Google Scholar 

  7. Feily, M., Shahrestani, A.: A Survey of Botnet and Botnet Detection. In: Third International Conference on Emerging Security Information, Systems and Technologies. IEEE, Los Alamitos (2009)

    Google Scholar 

  8. Li, C., Jiang, W., Zou, X.: Botnet: Survey and Case Study. In: Fourth International Conference on Innovative Computing, Information and Control. IEEE, Los Alamitos (2009)

    Google Scholar 

  9. Govil, J., Govil, J.: Criminology of BotNets and their Detection and Defense Methods. IEEE, Los Alamitos (2007)

    Book  Google Scholar 

  10. Jackson, A.W., Lapsley, D., Jones, C., Zatko, M., Golubitsky, C., Strayer, W.T.: SLINGbot A System for Live Investigation of Next Generation Botnets. In: Cybersecurity Applications & Technology Conference For Homeland Security. IEEE, Los Alamitos (2009)

    Google Scholar 

  11. Choi, H., Lee, H., Kim, H.: BotGAD: Detecting Botnets by Capturing Group Activities in Network Traffic. In: COMSWARE, Dublin, Ireland (2009)

    Google Scholar 

  12. Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: 17th USENIX Security Symposium (2008)

    Google Scholar 

  13. Yu, F., Xie, Y., Ke, Q.: SBotMiner: Large Scale Search Bot Detection. In: WSDM, February 4-6. ACM, USA (2010)

    Google Scholar 

  14. Villamarín-Salomón, R., Brustoloni, J.: Bayesian Bot Detection Based on DNS Traffic Similarity. In: SAC 2009, March 8-12 (2009)

    Google Scholar 

  15. Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) (2008)

    Google Scholar 

  16. Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming Botnets: Signatures and Characteristics. In: SIGCOMM 2008, August 17-22 (2008)

    Google Scholar 

  17. Lu, W., Tavallaee, M., Ghorbani, A.: Automatic Discovery of Botnet Communities on Large-Scale Communication Networks. In: ASIACCS 2009, March 10-12 (2009)

    Google Scholar 

  18. Chang, S., Daniels, T.: P2P Botnet Detection using Behavior Clustering & Statistical Tests. In: AISec 2009, November 9. ACM, New York (2009)

    Google Scholar 

  19. Muhammad, M., Gao, J., Khan, L.: Peer to Peer Botnet Detection for Cyber-Security: A Data Mining Approach. In: CSIIRW 2008, Oak Ridge, Tennessee, USA (2008)

    Google Scholar 

  20. Liu, L., Chen, S., Yan, G., Zhang, Z.: BotTracer: Execution-based Bot-like Malware Detection. LNCS. Springer, Heidelberg (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rahim, A., bin Muhaya, F.T. (2010). Discovering the Botnet Detection Techniques. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17610-4_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17609-8

  • Online ISBN: 978-3-642-17610-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics