An Overview of Modern Botnets

ABSTRACT Botnets, a network of malware-infected computers, have been used for a range of malicious activities. Evolving from fast fluxing to employing anonymous networks, they have matured and have become exceedingly sophisticated over the years. Understanding and dismantling these networks has become a global effort that requires active research and cooperation between private and government sectors. In this paper, we provide the latest overview of modern botnets in terms of structure, purpose, formation, detection, and mitigation. We also review recent developments on botnets and related research in combating this phenomenon.

[1]  David M. Nicol,et al.  The Koobface botnet and the rise of social malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[2]  Farnam Jahanian,et al.  A Survey of Botnet Technology and Defenses , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.

[3]  A. Nur Zincir-Heywood,et al.  Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[4]  Lachlan Kang Efficient botnet herding within the Tor network , 2014, Journal of Computer Virology and Hacking Techniques.

[5]  Dae-il Jang,et al.  Evasion technique and detection of malicious botnet , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[6]  Amr M. Youssef,et al.  Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.

[7]  B. S. Manoj,et al.  Fast-flux botnet detection from network traffic , 2014, 2014 Annual IEEE India Conference (INDICON).

[8]  M. Eslahi,et al.  MoBots: A new generation of botnets on mobile devices and networks , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).

[9]  Rosli Salleh,et al.  Mobile Botnet Attacks: A Thematic Taxonomy , 2014, WorldCIST.

[10]  Shujun Li,et al.  A novel anti-phishing framework based on honeypots , 2009, 2009 eCrime Researchers Summit.

[11]  Ali A. Ghorbani,et al.  SMS mobile botnet detection using a multi-agent system: research in progress , 2014, ACySE '14.

[12]  Scott J. Shackelford From Nuclear War to Net War: Analogizing Cyber Attacks in International Law , 2009 .

[13]  Zhuo Lu,et al.  How can botnets cause storms? Understanding the evolution and impact of mobile botnets , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[14]  Les Smith,et al.  Semi-supervised Time Series Modeling for Real-Time Flux Domain Detection on Passive DNS Traffic , 2014, MLDM.

[15]  Ruby B. Lee,et al.  Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.

[16]  Ricardo J. Rodríguez,et al.  Detection of Intrusions and Malware, and Vulnerability Assessment , 2016, Lecture Notes in Computer Science.

[17]  Zhen Ling,et al.  TorWard: Discovery of malicious traffic over Tor , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[18]  Yongzheng Zhang,et al.  DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance , 2014, 2014 9th IEEE International Conference on Networking, Architecture, and Storage.

[19]  Fu-Hau Hsu,et al.  Detect Fast-Flux Domains Through Response Time Differences , 2014, IEEE Journal on Selected Areas in Communications.

[20]  Stefano Zanero,et al.  Phoenix: DGA-Based Botnet Tracking and Intelligence , 2014, DIMVA.

[21]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[22]  Reza Sharifnya,et al.  DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic , 2015, Digit. Investig..

[23]  David W. McDonald,et al.  Dissecting a Social Botnet: Growth, Content and Influence in Twitter , 2015, CSCW.

[24]  Jason Livingood,et al.  Recommendations for the Remediation of Bots in ISP Networks , 2012, RFC.

[25]  Johannes M. Bauer,et al.  The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data , 2010, WEIS.