Botnets : lifecycle and taxonomy
Autor: | Yosra Ben Mustapha, Hervé Debar, Gustavo Gonzalez Granadillo, Nabil Hachem |
---|---|
Přispěvatelé: | Département Réseaux et Services de Télécommunications (RST), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Centre National de la Recherche Scientifique (CNRS), Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP) |
Jazyk: | angličtina |
Rok vydání: | 2011 |
Předmět: |
Engineering
Software_OPERATINGSYSTEMS Network security Internet privacy 0211 other engineering and technologies Botnet Denial-of-service attack 02 engineering and technology computer.software_genre Computer security Computer virus Security and privacy [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] 0202 electrical engineering electronic engineering information engineering Resilience (network) 021110 strategic defence & security studies business.industry ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS Phishing ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS Malware ComputingMilieux_COMPUTERSANDSOCIETY 020201 artificial intelligence & image processing The Internet business computer |
Zdroj: | Proceedings SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1-8, ⟨10.1109/SAR-SSI.2011.5931395⟩ |
DOI: | 10.1109/SAR-SSI.2011.5931395⟩ |
Popis: | International audience; The new threat of the Internet, but little known to the 'general public' is constituted by botnets. Botnets are networks of infected computers, which are headed by a pirate called also 'Attacker' or 'Master'. The botnets are nowadays mainly responsible for large-scale coordinated attacks. The attacker can ask the infected computers called 'Agents' or 'Zombies' to perform all sorts of tasks for him, like sending spam, performing DDoS attacks, phishing campaigns, delivering malware, or leasing or selling their botnets to other fraudsters anywhere. In this paper we present a classification that reflects the life cycle and current resilience techniques of botnets, distinguishing the propagation, the injection, the control and the attack phases. Then we study the effectiveness of the adopted taxonomy by applying it to existing botnets to study their main characteristics. We conclude by the upcoming steps in our research |
Databáze: | OpenAIRE |
Externí odkaz: |