Zhang, Lei, Yu, Shui, Wu, Di and Watters, Paul 2011, A survey on latest botnet attack and defense, in TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, [Changsha, China], pp. 53-60.
(Some files may be inaccessible until you login with your Deakin Research Online credentials)
A botnet is a group of compromised computers, which are remotely controlled by hackers to launch various network attacks, such as DDoS attack and information phishing. Botnet has become a popular and productive tool behind many cyber attacks. Recently, the owners of some botnets, such as storm worm, torpig and conflicker, are employing fluxing techniques to evade detection. Therefore, the understanding of their fluxing tricks is critical to the success of defending from botnet attacks. Motivated by this, we survey the latest botnet attacks and defenses in this paper. We begin with introducing the principles of fast fluxing (FF) and domain fluxing (DF), and explain how these techniques were employed by botnet owners to fly under the radar. Furthermore, we investigate the state-of-art research on fluxing detection. We also compare and evaluate those fluxing detection methods by multiple criteria. Finally, we discuss future directions on fighting against botnet based attacks.