Skip to main content

Abstract

Botnets are security threat now days, since they tend to perform serious internet attacks in vast area through the compromised group of infected machines. The presence of command and control mechanism in botnet structure makes them stronger than traditional attacks. Over course of the time botnet developer have switched to more advanced mechanism to evade each of which new detection methods and countermeasures. As our knowledge , existing survey on botnets area have just focused on determining different attributes of botnet behavior, hence this paper attempts to introduce botnet with a famous bot sample for defined behavior that provides obvious view on botnets and its feature. This paper is based on our two previous accepted papers of botnets on IEEE conferences namely ICCSIT 2011 and ICNCS 2010.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brodsky, A., Brodsky, D.: A Distributed Content Independent Method for Spam Detection, University of Winnipeg, Winnipeg, MB, Canada, R3B 2E9, Microsoft Corporation, Redmond, WA, USA (2007)

    Google Scholar 

  2. Cole, A., Mellor, M., Noyes, D.: Botnets: The Rise of the Machines (2006)

    Google Scholar 

  3. Botnets: The New Threat Landscape, Cisco Systems solutions (2007)

    Google Scholar 

  4. Shirley, B., Mano, C.D.: Sub-Botnet Coordination Using Tokens in a Switched Network. Department of Computer Science Utah State University, Logan, Utah (2008)

    Google Scholar 

  5. Davis, C.R., Fernandez, J.M., Neville, S., McHugh, J.: Sybil attacks as a mitigation strategy against the Storm botnet, École Polytechnique de Montréal, University of Victoria, Dalhousie University (2008)

    Google Scholar 

  6. Li, C., Jiang, W., Zou, X.: Botnet: Survey and Case Study, National Computer network Emergency Response technical, Research Center of Computer Network and Information Security Technology Harbin Institute of  Technology, China (2010)

    Google Scholar 

  7. Dagon, D., Gu, G., Lee, C.P., Lee, W.: A Taxonomy of Botnet Structures. Georgia Institute of Technology, USA (2008)

    Google Scholar 

  8. Dittrich, D., Dietrich, S.: Discovery techniques for P2P botnets, Applied Physics Laboratory University of Washington (2008)

    Google Scholar 

  9. Dittrich, D., Dietrich, S.: P2P as botnet command and control: a deeper insight. Applied Physics Laboratory University of Washington, Computer Science Department Stevens Institute of Technology (2008)

    Google Scholar 

  10. Stinson, E., Mitchell, J.C.: Characterizing Bots’ Remote Control Behavior, Department of Computer Science. Stanford University, Stanford (2008)

    Google Scholar 

  11. Cooke, E., Jahanian, F., McPherson, D.: The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. Electrical Engineering and Computer Science Department University of Michigan (2005)

    Google Scholar 

  12. Naseem, F., Shafqat, M., Sabir, U., Shahzad, A.: A Survey of Botnet Technology and Detection, Department of Computer Engineering University of Engineering and Technology, Taxila, Pakistan 47040. International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS 10(01) (2010)

    Google Scholar 

  13. Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic, School of Computer Science, College of Computing Georgia Institute of Technology Atlanta, GA (2008)

    Google Scholar 

  14. Milletary, J.: Technical Trends in Phishing Attacks, US-CERT (2005)

    Google Scholar 

  15. Nazario, J.: BlackEnergy DDoS Bot Analysis, Arbor Networks (October 2007)

    Google Scholar 

  16. McLaughlin, L.: Bot Software Spreads, Causes New Worries. IEEE Distributed Systems Online 1541-4922 © (2004)

    Google Scholar 

  17. Daswani, N., Stoppelman, M.: the Google Click Quality and Security Teams, The Anatomy of Clickbot.A, Google, Inc. (2007)

    Google Scholar 

  18. Provos, N., Holz, T.: Virtual honeypot: tracking botnet (2007)

    Google Scholar 

  19. Ianelli, N., Hackworth, A.: Botnets as a Vehicle for Online Crime, CERT/Coordination Center (2005)

    Google Scholar 

  20. Yegneswaran, P.B.V.: An Inside Look at Botnets, Computer Sciences Department University of Wisconsin, Madison (2007)

    Google Scholar 

  21. Royal, P.: On the Kraken and Bobax Botnets, DAMBALLA (April 9, 2008)

    Google Scholar 

  22. Wang, P., Aslam, B., Zou, C.C.: Peer-to-Peer Botnets: The Next Generation of Botnet Attacks. School of Electrical Engineering and Computer Science. University of Central Florida, Orlando (2010)

    Google Scholar 

  23. Wang, P., Wu, L., Aslam, B., Zou, C.C.: A Systematic Study on Peer-to-Peer Botnets. School of Electrical Engineering & Computer Science University of Central Florida Orlando, Florida 32816, USA (2009)

    Google Scholar 

  24. Mitchell, S.P., Linden, J.: Click Fraud: what is it and how do we make it go away, Thinkpartnership (2006)

    Google Scholar 

  25. Mori, T., Esquivel, H., Akella, A., Shimoda, A., Goto, S.: Understanding Large-Scale Spamming Botnets From Internet Edge Sites, NTT Laboratories 3-9-11 Midoricho Musashino Tokyo, Japan 180-8585, UW – Madison 1210 W. Dayton St. Madison, WI 53706-1685, Waseda University 3-4-1 Ohkubo, Shinjuku Tokyo, Japan (2010)

    Google Scholar 

  26. Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on StormWorm, University of Mannheim, Institut Eur´ecom, Sophia Antipolis (2008)

    Google Scholar 

  27. Holz, T.: Spying with bots, Laboratory for Dependable Distributed Systems at RWTH Aachen University (2005)

    Google Scholar 

  28. Lu, W., Tavallaee, M., Ghorbani, A.A.: Automatic Discovery of Botnet Communities on Large-Scale Communication Networks, University of New Brunswick, Fredericton, NB E3B 5A3, Canada (2009)

    Google Scholar 

  29. Zhu, Z., Lu, G., Chen, Y., Fu, Z.J., Roberts, P., Han, K.: Botnet Research Survey, Northwestern Univ., Evanston, IL (2008)

    Google Scholar 

  30. Zhu, Z., Lu, G., Fu, Z.J., Roberts, P., Han, K., Chen, Y.: Botnet Research Survey, Northwestern University, Tsinghua University (2008)

    Google Scholar 

  31. Li, Z., Hu, J., Hu, Z., Wang, B., Tang, L., Yi, X.: Measuring the botnet using the second character of bots, School of computer science and technology, Huazhong University of Science and Technology, Wuhan, China (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lashkari, A.H., Ghalebandi, S.G., Reza Moradhaseli, M. (2011). A Wide Survey on Botnet. In: Cherifi, H., Zain, J.M., El-Qawasmeh, E. (eds) Digital Information and Communication Technology and Its Applications. DICTAP 2011. Communications in Computer and Information Science, vol 166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21984-9_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21984-9_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21983-2

  • Online ISBN: 978-3-642-21984-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics