首页> 外文会议>Annual midwest instruction and computing symposium >SECURITY THREATS/ATTACKS VIA BOTNETS AND BOTNET DETECTION PREVENTION TECHNIQUES IN COMPUTER NETWORKS: A REVIEW
【24h】

SECURITY THREATS/ATTACKS VIA BOTNETS AND BOTNET DETECTION PREVENTION TECHNIQUES IN COMPUTER NETWORKS: A REVIEW

机译:通过计算机网络中的僵尸网络和僵尸网络检测和预防技术安全威胁/攻击:审查

获取原文

摘要

Today botnets have become one of the biggest risks in the network and security world and have been an infrastructure to carry out nearly every type of cyber-attacks as they provide a distributed platform for different illegal activities like launching the distributed denial of service attacks (DDoS). Recently botnet detection has been a very interesting research topic in the cyber security platform. Botnets are mainly responsible for large scale coordinated attacks. Infected computers also known as an 'Agent' or 'Zombies' perform all kinds of tasks for the bot-master such as phishing campaigns, sending spam, delivering malware or leasing or selling botnet to other hackers or fraudsters. Further, botnets remain a large-scale problem that affects the entire Internet and cyber-security community and requires a significant level of co-operation among operators and providers. Unlike the other types of malwares, botnets are well organized and controlled by skilled bot-masters. They employ various strategies to keep their bots safe and hidden if possible. Therefore, botnet detection is a big challenge in network security management. There are several methods and techniques in detecting and tracking the botnet activities. Each of these techniques has its advantages and disadvantages. In addition, these techniques are designed based on computers and computer networks' specifications and might not be fully applicable for new generations of botnets. As botnets change their C&C communication architecture, these methods will be ineffective. Hence, developing techniques based on data mining and DNS traffic for botnet C&C traffic detection has been the most promising approach to combat botnet threat against online ecosystems and computer assets. This paper reviews overview of current state of bots and botnets, how networks are threatened or attacked by botnets with their detection and the prevention techniques.
机译:今天,僵尸网络已成为网络和安全世界中最大的风险之一,并且一直是一个基础设施,用于实现几乎所有类型的网络攻击,因为它们为不同的非法活动提供了一种不同的非法活动,如推出分布式拒绝服务攻击(DDOS )。最近僵尸网络检测是网络安全平台中的一个非常有趣的研究主题。僵尸网络主要负责大规模协调攻击。感染的计算机也称为“代理”或“僵尸”为BOT主机执行各种任务,例如网络钓鱼活动,发送垃圾邮件,将恶意软件或租赁或将僵尸网络交付给其他黑客或欺诈者。此外,僵尸网络仍然是影响整个互联网和网络安全社区的大规模问题,并且需要在运营商和提供商之间进行显着的合作。与其他类型的恶性棕褐色不同,僵尸网络通过熟练的BOT主体组织和控制。他们采用各种策略来保持机器人安全和隐藏。因此,僵尸网络检测是网络安全管理中的一个大挑战。检测和跟踪僵尸网络活动有几种方法和技术。这些技术中的每一种都具有其优点和缺点。此外,这些技术是根据计算机和计算机网络的规格设计的,并且可能无法完全适用于新一代僵尸网络。随着僵尸网络改变其C&C通信架构,这些方法将无效。因此,基于数据挖掘和僵尸网络C&C流量检测的DNS流量的开发技术已经是打击僵尸网络威胁对在线生态系统和计算机资产的最有希望的方法。本文评论概述当前的机器人和僵尸网络,网络如何受到僵尸网络的威胁或攻击的概述,并通过其检测和预防技术进行攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号