Botnets : lifecycle and taxonomy

Autor: Yosra Ben Mustapha, Hervé Debar, Gustavo Gonzalez Granadillo, Nabil Hachem
Přispěvatelé: Département Réseaux et Services de Télécommunications (RST), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Centre National de la Recherche Scientifique (CNRS), Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)
Jazyk: angličtina
Rok vydání: 2011
Předmět:
Zdroj: Proceedings SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security
SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security
SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1-8, ⟨10.1109/SAR-SSI.2011.5931395⟩
DOI: 10.1109/SAR-SSI.2011.5931395⟩
Popis: International audience; The new threat of the Internet, but little known to the 'general public' is constituted by botnets. Botnets are networks of infected computers, which are headed by a pirate called also 'Attacker' or 'Master'. The botnets are nowadays mainly responsible for large-scale coordinated attacks. The attacker can ask the infected computers called 'Agents' or 'Zombies' to perform all sorts of tasks for him, like sending spam, performing DDoS attacks, phishing campaigns, delivering malware, or leasing or selling their botnets to other fraudsters anywhere. In this paper we present a classification that reflects the life cycle and current resilience techniques of botnets, distinguishing the propagation, the injection, the control and the attack phases. Then we study the effectiveness of the adopted taxonomy by applying it to existing botnets to study their main characteristics. We conclude by the upcoming steps in our research
Databáze: OpenAIRE