Title :
A First Step towards Characterizing Stealthy Botnets
Author :
Leonard, Justin ; Xu, Shouhuai ; Sandhu, Ravi
Author_Institution :
Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX
Abstract :
Botnets have become a top cyber threat. Existing studies on botnets have mainly focused on showing how to exploit certain characteristics of existing botnets to detect them. However, such detection mechanisms could be defeated by stealthy botnets that are designed to evade them. Therefore, it is important to understand the power of stealthy botnets so as to answer questions such as: What kinds of stealth techniques can survive what kinds of detection mechanisms? Towards the ultimate goal, this paper makes a first step with the aim to build fundamental understandings of stealthy botnet command and control (C&C).
Keywords :
invasive software; command-and-control; cyber threat; stealthy botnet; Availability; Command and control systems; Computer networks; Computer science; Computer security; Internet; Peer to peer computing; Protocols; Relays; Topology; Stealthy botnets; botnet C\\&C; botnet characteristics; botnet modeling; botnet stealth management;
Conference_Titel :
Availability, Reliability and Security, 2009. ARES '09. International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
978-1-4244-3572-2
Electronic_ISBN :
978-0-7695-3564-7
DOI :
10.1109/ARES.2009.63