作者: Maryam Nezhadkamali , Seyed Amin Hosseini Seno , Rahmat Budiarto , Somayeh Soltani
DOI:
关键词: Rootkit 、 Botnet 、 Denial-of-service attack 、 Drive-by download 、 Covert channel 、 Kraken 、 Computer security 、 Rustock botnet 、 Srizbi botnet 、 Computer science
摘要: Mitigating the destructive effect of botnets is a concern security scholars. Though various mechanisms are proposed for detection, real world still survive and do their harmful operations. Botnets have developed new evasion techniques covert communication channels. Knowing characteristics helps researchers in developing more robust detection methods. There some surveys literature that study botnet methods; however they not advert to lot. In this paper, we aspects several botnets, i.e. Conficker, Kraken, Rustock, Storm, TDL4, Torpig, Waledac, Zeus P2P Zeus. Architecture, protocol, type infection, interval, attacks these probed paper. Moreover, studies on mitigation trends channels reviewed.