Botnets

Botnets

Architectures, Countermeasures, and Challenges

Zhou, Peng; Kambourakis, Georgios; Meng, Weizhi; Anagnostopoulos, Marios

Taylor & Francis Ltd

08/2022

438

Mole

Inglês

9781032401133

15 a 20 dias

553

Descrição não disponível.
Contents

Preface .......................................................................................................... vii

About the Editors ...........................................................................................ix

Contributors...................................................................................................xi

1 Botnet Architectures: A State-of-the-Art Review.................................... 1

BASHEER AL-DUWAIR AND MOATH JARRAH

2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33

PASCAL GEENENS

3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101

PASCAL GEENENS

4 Advanced Information Hiding Techniques for Modern Botnets ....... 165

LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN

WENDZEL

5 Steganography Techniques for Command and Control

(C2) Channels.................................................................................... 189

JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI

6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217

WEIZHI WANG AND XIAOBO MA

7 Detecting Botnets and Unknown Network Attacks in

Big Traffic Data ................................................................................. 237

LUIS SACRAMENTO, IBERIA MEDEIROS, JOAO BOTA, AND MIGUEL

CORREIA

8 Domain Generation Algorithm Detection Techniques through

Network Analysis and Machine Learning .......................................... 269

FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA

9 Identifying IoT-Based Botnets: A Microservice Architecture for

IoT Management and Security........................................................... 293

THARUN KAMMARA AND MELODY MOH

10 Understanding and Detecting Social Botnet.......................................327

YUEDE JI AND QIANG LI

11 Use of Botnets for Mining Cryptocurrencies ......................................359

RENITA MURIMI

12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387

GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND

GIUSEPPE GIULIO RUTIGLIANO

Index............................................................................................................403
TCP Connection;IoT Device;economics;Mobile Botnets;mobile botnet;DoS Attack;traffic;Information Hiding Techniques;botnet;Launch DDOS Attack;cryptocurrency mining;Public IP Address;analysis;Bot Herder;architecture;IP Address;Big Data;Port Tcp;botnet ecosystem;Unsupervised Machine Learning;Botnet-as-a-Service;Social Bots;cloud;Botnet Detection;cybercrime;Network Steganography;DDoS attack;IRC Protocol;defense;ICMP;detection;Data Set;infiltration;Covert Channels;Internet of Things;DNS Traffic;IoT;P2P Botnets;monitoring;C2 Channel;peer-to-peer (P2P) botnet;IRC Server;security;Evasion Mechanisms;social network;Unsupervised Ml Algorithm;state-of-the-art botnet architectures;Destination IP Address;void countermeasures;Internet-of-things based botnets