Botnets
Botnets
Architectures, Countermeasures, and Challenges
Zhou, Peng; Anagnostopoulos, Marios; Kambourakis, Georgios; Meng, Weizhi
Taylor & Francis Ltd
08/2022
438
Mole
Inglês
9781032401133
15 a 20 dias
553
Descrição não disponível.
Contents
Preface .......................................................................................................... vii
About the Editors ...........................................................................................ix
Contributors...................................................................................................xi
1 Botnet Architectures: A State-of-the-Art Review.................................... 1
BASHEER AL-DUWAIR AND MOATH JARRAH
2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33
PASCAL GEENENS
3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101
PASCAL GEENENS
4 Advanced Information Hiding Techniques for Modern Botnets ....... 165
LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN
WENDZEL
5 Steganography Techniques for Command and Control
(C2) Channels.................................................................................... 189
JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI
6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217
WEIZHI WANG AND XIAOBO MA
7 Detecting Botnets and Unknown Network Attacks in
Big Traffic Data ................................................................................. 237
LUIS SACRAMENTO, IBERIA MEDEIROS, JOAO BOTA, AND MIGUEL
CORREIA
8 Domain Generation Algorithm Detection Techniques through
Network Analysis and Machine Learning .......................................... 269
FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA
9 Identifying IoT-Based Botnets: A Microservice Architecture for
IoT Management and Security........................................................... 293
THARUN KAMMARA AND MELODY MOH
10 Understanding and Detecting Social Botnet.......................................327
YUEDE JI AND QIANG LI
11 Use of Botnets for Mining Cryptocurrencies ......................................359
RENITA MURIMI
12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387
GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND
GIUSEPPE GIULIO RUTIGLIANO
Index............................................................................................................403
Preface .......................................................................................................... vii
About the Editors ...........................................................................................ix
Contributors...................................................................................................xi
1 Botnet Architectures: A State-of-the-Art Review.................................... 1
BASHEER AL-DUWAIR AND MOATH JARRAH
2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33
PASCAL GEENENS
3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101
PASCAL GEENENS
4 Advanced Information Hiding Techniques for Modern Botnets ....... 165
LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN
WENDZEL
5 Steganography Techniques for Command and Control
(C2) Channels.................................................................................... 189
JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI
6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217
WEIZHI WANG AND XIAOBO MA
7 Detecting Botnets and Unknown Network Attacks in
Big Traffic Data ................................................................................. 237
LUIS SACRAMENTO, IBERIA MEDEIROS, JOAO BOTA, AND MIGUEL
CORREIA
8 Domain Generation Algorithm Detection Techniques through
Network Analysis and Machine Learning .......................................... 269
FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA
9 Identifying IoT-Based Botnets: A Microservice Architecture for
IoT Management and Security........................................................... 293
THARUN KAMMARA AND MELODY MOH
10 Understanding and Detecting Social Botnet.......................................327
YUEDE JI AND QIANG LI
11 Use of Botnets for Mining Cryptocurrencies ......................................359
RENITA MURIMI
12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387
GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND
GIUSEPPE GIULIO RUTIGLIANO
Index............................................................................................................403
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
TCP Connection;IoT Device;Mobile Botnets;DoS Attack;Information Hiding Techniques;Launch DDOS Attack;Public IP Address;Bot Herder;IP Address;Port Tcp;Unsupervised Machine Learning;Social Bots;Botnet Detection;Network Steganography;IRC Protocol;ICMP;Data Set;Covert Channels;DNS Traffic;P2P Botnets;C2 Channel;IRC Server;Evasion Mechanisms;Unsupervised Ml Algorithm;Destination IP Address
Contents
Preface .......................................................................................................... vii
About the Editors ...........................................................................................ix
Contributors...................................................................................................xi
1 Botnet Architectures: A State-of-the-Art Review.................................... 1
BASHEER AL-DUWAIR AND MOATH JARRAH
2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33
PASCAL GEENENS
3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101
PASCAL GEENENS
4 Advanced Information Hiding Techniques for Modern Botnets ....... 165
LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN
WENDZEL
5 Steganography Techniques for Command and Control
(C2) Channels.................................................................................... 189
JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI
6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217
WEIZHI WANG AND XIAOBO MA
7 Detecting Botnets and Unknown Network Attacks in
Big Traffic Data ................................................................................. 237
LUIS SACRAMENTO, IBERIA MEDEIROS, JOAO BOTA, AND MIGUEL
CORREIA
8 Domain Generation Algorithm Detection Techniques through
Network Analysis and Machine Learning .......................................... 269
FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA
9 Identifying IoT-Based Botnets: A Microservice Architecture for
IoT Management and Security........................................................... 293
THARUN KAMMARA AND MELODY MOH
10 Understanding and Detecting Social Botnet.......................................327
YUEDE JI AND QIANG LI
11 Use of Botnets for Mining Cryptocurrencies ......................................359
RENITA MURIMI
12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387
GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND
GIUSEPPE GIULIO RUTIGLIANO
Index............................................................................................................403
Preface .......................................................................................................... vii
About the Editors ...........................................................................................ix
Contributors...................................................................................................xi
1 Botnet Architectures: A State-of-the-Art Review.................................... 1
BASHEER AL-DUWAIR AND MOATH JARRAH
2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33
PASCAL GEENENS
3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101
PASCAL GEENENS
4 Advanced Information Hiding Techniques for Modern Botnets ....... 165
LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN
WENDZEL
5 Steganography Techniques for Command and Control
(C2) Channels.................................................................................... 189
JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI
6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217
WEIZHI WANG AND XIAOBO MA
7 Detecting Botnets and Unknown Network Attacks in
Big Traffic Data ................................................................................. 237
LUIS SACRAMENTO, IBERIA MEDEIROS, JOAO BOTA, AND MIGUEL
CORREIA
8 Domain Generation Algorithm Detection Techniques through
Network Analysis and Machine Learning .......................................... 269
FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA
9 Identifying IoT-Based Botnets: A Microservice Architecture for
IoT Management and Security........................................................... 293
THARUN KAMMARA AND MELODY MOH
10 Understanding and Detecting Social Botnet.......................................327
YUEDE JI AND QIANG LI
11 Use of Botnets for Mining Cryptocurrencies ......................................359
RENITA MURIMI
12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387
GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND
GIUSEPPE GIULIO RUTIGLIANO
Index............................................................................................................403
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
TCP Connection;IoT Device;Mobile Botnets;DoS Attack;Information Hiding Techniques;Launch DDOS Attack;Public IP Address;Bot Herder;IP Address;Port Tcp;Unsupervised Machine Learning;Social Bots;Botnet Detection;Network Steganography;IRC Protocol;ICMP;Data Set;Covert Channels;DNS Traffic;P2P Botnets;C2 Channel;IRC Server;Evasion Mechanisms;Unsupervised Ml Algorithm;Destination IP Address