A Survey of Advances in Botnet Technologies

Botnets have come a long way since their inception a few decades ago. Originally toy programs written by network hobbyists, modern-day botnets can be used by cyber criminals to steal billions of dollars from users, corporations, and governments. This paper will look at cutting-edge botnet features and detection strategies from over a dozen research papers, supplemented by a few additional sources. With this data, I will then hypothesize what the future of botnets might hold.

[1]  Vishal Goar,et al.  Tools, Techniques & Analysis of Botnet , 2014, ICTCS '14.

[2]  Konstantin Beznosov,et al.  Design and analysis of a social botnet , 2013, Comput. Networks.

[3]  Gianluca Stringhini,et al.  The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape , 2014, AsiaCCS.

[4]  Steve Gold,et al.  Taking down botnets , 2011, Netw. Secur..

[5]  Guevara Noubir,et al.  OnionBots: Subverting Privacy Infrastructure for Cyber Attacks , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[6]  Richard J. Enbody,et al.  Dissecting SpyEye - Understanding the design of third generation botnets , 2013, Comput. Networks.

[7]  Ke Li,et al.  POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System , 2014, CCS.

[8]  Farnam Jahanian,et al.  A Survey of Botnet Technology and Defenses , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.

[9]  Uyen Trang Nguyen,et al.  Socellbot: A new botnet design to infect smartphones via online social networking , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[10]  Jungmin So,et al.  On botnets , 2010, iiWAS.

[11]  Maciá-FernándezGabriel,et al.  Survey and taxonomy of botnet research through life-cycle , 2013 .

[12]  Gabriel Maciá-Fernández,et al.  Survey and taxonomy of botnet research through life-cycle , 2013, CSUR.

[13]  Stefan Savage,et al.  Botcoin: Monetizing Stolen Cycles , 2014, NDSS.

[14]  田端 利宏,et al.  Network and Distributed System Security Symposiumにおける研究動向の調査 , 2004 .

[15]  Grzegorz Landecki Detecting botnets , 2009 .

[16]  Ali A. Ghorbani,et al.  Botnet detection based on traffic behavior analysis and flow intervals , 2013, Comput. Secur..

[17]  Chung-Nan Lee,et al.  Automatically Generating Payload-Based Models for Botnet Detection , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).

[18]  Ronaldo M. Salles,et al.  Botnets: A survey , 2013, Comput. Networks.