A Wide Scale Survey on Botnet

the diverse forms of malware, Botnet is the serious threat which occurs commonly in today"s cyber attacks and cyber crimes. Botnet are designed to perform predefined functions in an automated fashion, where these malicious activities ranges from online searching of data, accessing lists, moving files sharing channel information to DDoS attacks against critical targets, phishing, click fraud etc. Existence of command and control(CC in turn throws challenges in the mitigation of Botnet attacks. Hence Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention. Various types of techniques and approaches have been proposed for detection, mitigation and preventation to Botnet attack. This paper, discusses in detail about Botnet and related research including Botnet evolution, life-cycle, command and control models, communication protocols, Botnet detection, and Botnet mitigation mechanism etc. Also an overview of research on Botnets which describe the possible attacks performed by various types of Botnet communication technologies in future.

[1]  Joseph Massi,et al.  Botnet Detection and Mitigation , 2010 .

[2]  Hossein Rouhani Zeidanloo,et al.  Botnet Command and Control Mechanisms , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[3]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[4]  Christopher Krügel,et al.  Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.

[5]  Brent Byunghoon Kang,et al.  Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.

[6]  Abhinav Srivastava,et al.  Evaluating email’s feasibility for botnet command and control , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[7]  Mourad Debbabi,et al.  Insights from the analysis of the Mariposa botnet , 2010, 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS).

[8]  Shun-Zheng Yu,et al.  An HTTP Flooding Detection Method Based on Browser Behavior , 2006, 2006 International Conference on Computational Intelligence and Security.

[9]  Heejo Lee,et al.  Botnet Detection by Monitoring Group Activities in DNS Traffic , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).

[10]  Sureswaran Ramadass,et al.  A Survey of Botnet and Botnet Detection , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[11]  Andreas Terzis,et al.  A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.

[12]  Wei Yu,et al.  A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks , 2008, 2008 IEEE International Conference on Communications.

[13]  Ping Wang,et al.  An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.

[14]  Hossein Rouhani Zeidanloo,et al.  New Approach for Detection of IRC and P2P Botnets , 2010 .

[15]  Vinod Yegneswaran,et al.  BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.

[16]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[17]  Yan Chen,et al.  Botnet Research Survey , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.

[18]  Nick Feamster,et al.  Understanding the network-level behavior of spammers , 2006, SIGCOMM.

[19]  Suresh Singh,et al.  An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.

[20]  Yakov Rekhter,et al.  Dynamic Updates in the Domain Name System (DNS UPDATE) , 1997, RFC.

[21]  Hossein Rouhani Zeidanloo,et al.  Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.

[22]  Farnam Jahanian,et al.  The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.

[23]  Wei Jiang,et al.  Botnet: Survey and Case Study , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).

[24]  Christophe Kalt,et al.  Internet Relay Chat: Client Protocol , 2000, RFC.

[25]  Guofei Gu,et al.  A Taxonomy of Botnet Structures , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[26]  Jong-Soo Jang,et al.  Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.

[27]  Thorsten Holz,et al.  Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.

[28]  Claudio Mazzariello IRC Traffic Analysis for Botnet Detection , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[29]  Brian Rexroad,et al.  Wide-Scale Botnet Detection and Characterization , 2007, HotBots.

[30]  Guofei Gu,et al.  BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.

[31]  Mitsuaki Akiyama,et al.  A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior , 2007, 2007 International Symposium on Applications and the Internet Workshops.

[32]  Gregory P. Schaffer Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats , 2006, IEEE Security & Privacy.

[33]  Pranab Banerjee,et al.  A Multi-Layered Approach to Botnet Detection , 2008, Security and Management.

[34]  R. Villamarin-Salomon,et al.  Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[35]  Lei Wu,et al.  Honeypot detection in advanced botnet attacks , 2010, Int. J. Inf. Comput. Secur..

[36]  Hossein Rouhani Zeidanloo,et al.  A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[37]  Kim-Kwang Raymond Choo Zombies and botnets , 2007 .

[38]  Amr M. Youssef,et al.  On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[39]  Ravishankar Borgaonkar,et al.  An Analysis of the Asprox Botnet , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.