Survey on botnet: Its architecture, detection, prevention and mitigation

Robot Network or BOTNET is the biggest network security threats faced by home users, organizations, and governments. Botnet is created by intelligent and up to date hackers, which challenges IT Community in detection, prevention and mitigation from Botnet attacks. This paper discuss about life cycle, topologies, detection and future prospects required to be safe from Botnet attacks.

[1]  Guofei Gu,et al.  BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.

[2]  Wang Hailong,et al.  Heterogeneous Multi-sensor Information Fusion Model for Botnet Detection , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.

[3]  Yong Tang,et al.  Defending against Internet worms: a signature-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  Sven Dietrich,et al.  P2P as botnet command and control: A deeper insight , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[5]  John McHugh,et al.  Sybil attacks as a mitigation strategy against the Storm botnet , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[6]  Radu State,et al.  BotCloud: Detecting botnets using MapReduce , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[7]  Heejo Lee,et al.  Botnet Detection by Monitoring Group Activities in DNS Traffic , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).

[8]  Basheer Al-Duwairi,et al.  BotDigger: A Fuzzy Inference System for Botnet Detection , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.

[9]  Burkhard Stiller,et al.  Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection , 2008, AIMS.

[10]  Nick Feamster,et al.  Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.

[11]  Thorsten Holz,et al.  Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.

[12]  Kevin W. Hamlen,et al.  Flow-based identification of botnet traffic by mining multiple log files , 2008, 2008 First International Conference on Distributed Framework and Applications.

[13]  Suresh Singh,et al.  An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.

[14]  Dae-il Jang,et al.  Analysis of HTTP2P botnet: case study waledac , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).

[15]  Su Chang,et al.  P2P botnet detection using behavior clustering & statistical tests , 2009, AISec '09.

[16]  Brandon Shirley,et al.  Sub-Botnet Coordination Using Tokens in a Switched Network , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[17]  Andreas Terzis,et al.  A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.

[18]  David Lee,et al.  Traceback Attacks in Cloud -- Pebbletrace Botnet , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[19]  Jian Kang,et al.  Detecting New Decentralized Botnet Based on Kalman Filter and Multi-chart CUSUM Amplification , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[20]  Wen-Hwa Liao,et al.  Peer to Peer Botnet Detection Using Data Mining Scheme , 2010, 2010 International Conference on Internet Technology and Applications.

[21]  Paul Barford,et al.  Toward Botnet Mesocosms , 2007, HotBots.

[22]  Vrizlynn L. L. Thing,et al.  A Survey of Bots Used for Distributed Denial of Service Attacks , 2007, SEC.

[23]  Hossein Rouhani Zeidanloo,et al.  Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.

[24]  Wei Jiang,et al.  Botnet: Survey and Case Study , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).

[25]  Ping Wang,et al.  An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.

[26]  Joseph B. Kadane,et al.  Using uncleanliness to predict future botnet addresses , 2007, IMC '07.

[27]  Alex Brodsky,et al.  A Distributed Content Independent Method for Spam Detection , 2007, HotBots.

[28]  R. Schoof,et al.  Detecting peer-to-peer botnets , 2007 .

[29]  Leyla Bilge,et al.  Automatically Generating Models for Botnet Detection , 2009, ESORICS.

[30]  Vinod Yegneswaran,et al.  BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.

[31]  Sureswaran Ramadass,et al.  A Survey of Botnet and Botnet Detection , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.