A survey on latest botnet attack and defense

Zhang, Lei, Yu, Shui, Wu, Di and Watters, Paul 2011, A survey on latest botnet attack and defense, in TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, [Changsha, China], pp. 53-60.

Attached Files
Name Description MIMEType Size Downloads

Title A survey on latest botnet attack and defense
Author(s) Zhang, Lei
Yu, Shui
Wu, Di
Watters, Paul
Conference name International Conference on Trust, Security and Privacy in Computing and Communications (10th : 2011 : Changsha, China)
Conference location Changsha, China
Conference dates 16-18 Nov. 2011
Title of proceedings TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications
Editor(s) [Unknown]
Publication date 2011
Conference series International Conference on Trust, Security and Privacy in Computing and Communications
Start page 53
End page 60
Total pages 8
Publisher IEEE
Place of publication [Changsha, China]
Keyword(s) survey
botnet
fast fluxing
domain fluxing
Summary A botnet is a group of compromised computers, which are remotely controlled by hackers to launch various network attacks, such as DDoS attack and information phishing. Botnet has become a popular and productive tool behind many cyber attacks. Recently, the owners of some botnets, such as storm worm, torpig and conflicker, are employing fluxing techniques to evade detection. Therefore, the understanding of their fluxing tricks is critical to the success of defending from botnet attacks. Motivated by this, we survey the latest botnet attacks and defenses in this paper. We begin with introducing the principles of fast fluxing (FF) and domain fluxing (DF), and explain how these techniques were employed by botnet owners to fly under the radar. Furthermore, we investigate the state-of-art research on fluxing detection. We also compare and evaluate those fluxing detection methods by multiple criteria. Finally, we discuss future directions on fighting against botnet based attacks.
ISBN 9780769546001
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890101 Fixed Line Data Networks and Services
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30042390

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 112 Abstract Views, 32 File Downloads  -  Detailed Statistics
Created: Tue, 14 Feb 2012, 15:46:57 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.