DocumentCode :
1921658
Title :
A First Step towards Characterizing Stealthy Botnets
Author :
Leonard, Justin ; Xu, Shouhuai ; Sandhu, Ravi
Author_Institution :
Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX
fYear :
2009
fDate :
16-19 March 2009
Firstpage :
106
Lastpage :
113
Abstract :
Botnets have become a top cyber threat. Existing studies on botnets have mainly focused on showing how to exploit certain characteristics of existing botnets to detect them. However, such detection mechanisms could be defeated by stealthy botnets that are designed to evade them. Therefore, it is important to understand the power of stealthy botnets so as to answer questions such as: What kinds of stealth techniques can survive what kinds of detection mechanisms? Towards the ultimate goal, this paper makes a first step with the aim to build fundamental understandings of stealthy botnet command and control (C&C).
Keywords :
invasive software; command-and-control; cyber threat; stealthy botnet; Availability; Command and control systems; Computer networks; Computer science; Computer security; Internet; Peer to peer computing; Protocols; Relays; Topology; Stealthy botnets; botnet C\\&C; botnet characteristics; botnet modeling; botnet stealth management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security, 2009. ARES '09. International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
978-1-4244-3572-2
Electronic_ISBN :
978-0-7695-3564-7
Type :
conf
DOI :
10.1109/ARES.2009.63
Filename :
5066461
Link To Document :
بازگشت