Botnets: Lifecycle and Taxonomy

作者: Nabil Hachem , Yosra Ben Mustapha , Gustavo Gonzalez Granadillo , Herve Debar

DOI: 10.1109/SAR-SSI.2011.5931395

关键词: Computer virusPhishingThe InternetNetwork securityComputer securityBotnetDenial-of-service attackMalwareResilience (network)Internet privacyEngineering

摘要: The new threat of the Internet, but little known to 'general public' is constituted by botnets. Botnets are networks infected computers, which headed a pirate called also 'Attacker' or 'Master'. botnets nowadays mainly responsible for large-scale coordinated attacks. attacker can ask computers 'Agents' 'Zombies' perform all sorts tasks him, like sending spam, performing DDoS attacks, phishing campaigns, delivering malware, leasing selling their other fraudsters anywhere. In this paper we present classification that reflects life cycle and current resilience techniques botnets, distinguishing propagation, injection, control attack phases. Then study effectiveness adopted taxonomy applying it existing main characteristics. We conclude upcoming steps in our research.

参考文章(7)
Markus Jakobsson, Zulfikar Ramzan, Crimeware: Understanding New Attacks and Defenses ,(2008)
Paul Barford, Vinod Yegneswaran, An Inside Look at Botnets Advances in Information Security. pp. 171- 191 ,(2007) , 10.1007/978-0-387-44599-1_8
Farnam Jahanian, Danny McPherson, Evan Cooke, The Zombie roundup: understanding, detecting, and disrupting botnets conference on steps to reducing unwanted traffic on internet. pp. 6- 6 ,(2005)
Kaveh Ghaboosi, Yang Xiao, Hongmei Deng, Jing Liu, Jingyuan Zhang, Botnet: classification, attacks, detection, tracing, and preventive measures wireless network security. ,vol. 2009, pp. 1184- 1187 ,(2009) , 10.1109/ICICIC.2009.127
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis, A multifaceted approach to understanding the botnet phenomenon internet measurement conference. pp. 41- 52 ,(2006) , 10.1145/1177080.1177086
Stephen M. Specht, Ruby B. Lee, Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures ISCA PDCS. pp. 543- 550 ,(2004)
Security Advisor, Rik Ferguson, The Botnet Chronicles A Journey to Infamy ,(2010)