TY - GEN
T1 - Botnets
T2 - 2011 Conference on Network and Information Systems Security, SAR-SSI 2011
AU - Hachem, Nabil
AU - Ben Mustapha, Yosra
AU - Granadillo, Gustavo Gonzalez
AU - Debar, Herve
PY - 2011/8/1
Y1 - 2011/8/1
N2 - The new threat of the Internet, but little known to the 'general public' is constituted by botnets. Botnets are networks of infected computers, which are headed by a pirate called also 'Attacker' or 'Master'. The botnets are nowadays mainly responsible for large-scale coordinated attacks. The attacker can ask the infected computers called 'Agents' or 'Zombies' to perform all sorts of tasks for him, like sending spam, performing DDoS attacks, phishing campaigns, delivering malware, or leasing or selling their botnets to other fraudsters anywhere. In this paper we present a classification that reflects the life cycle and current resilience techniques of botnets, distinguishing the propagation, the injection, the control and the attack phases. Then we study the effectiveness of the adopted taxonomy by applying it to existing botnets to study their main characteristics. We conclude by the upcoming steps in our research.
AB - The new threat of the Internet, but little known to the 'general public' is constituted by botnets. Botnets are networks of infected computers, which are headed by a pirate called also 'Attacker' or 'Master'. The botnets are nowadays mainly responsible for large-scale coordinated attacks. The attacker can ask the infected computers called 'Agents' or 'Zombies' to perform all sorts of tasks for him, like sending spam, performing DDoS attacks, phishing campaigns, delivering malware, or leasing or selling their botnets to other fraudsters anywhere. In this paper we present a classification that reflects the life cycle and current resilience techniques of botnets, distinguishing the propagation, the injection, the control and the attack phases. Then we study the effectiveness of the adopted taxonomy by applying it to existing botnets to study their main characteristics. We conclude by the upcoming steps in our research.
U2 - 10.1109/SAR-SSI.2011.5931395
DO - 10.1109/SAR-SSI.2011.5931395
M3 - Conference contribution
AN - SCOPUS:79960771968
SN - 9781457707377
T3 - 2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings
BT - 2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings
Y2 - 18 May 2011 through 21 May 2011
ER -