Reference Hub3
Botnets: Analysis, Detection, and Mitigation

Botnets: Analysis, Detection, and Mitigation

Hamad Binsalleeh
Copyright: © 2014 |Pages: 20
ISBN13: 9781466647893|ISBN10: 1466647892|EISBN13: 9781466647909
DOI: 10.4018/978-1-4666-4789-3.ch012
Cite Chapter Cite Chapter

MLA

Binsalleeh, Hamad. "Botnets: Analysis, Detection, and Mitigation." Network Security Technologies: Design and Applications, edited by Abdelmalek Amine, et al., IGI Global, 2014, pp. 204-223. https://doi.org/10.4018/978-1-4666-4789-3.ch012

APA

Binsalleeh, H. (2014). Botnets: Analysis, Detection, and Mitigation. In A. Amine, O. Mohamed, & B. Benatallah (Eds.), Network Security Technologies: Design and Applications (pp. 204-223). IGI Global. https://doi.org/10.4018/978-1-4666-4789-3.ch012

Chicago

Binsalleeh, Hamad. "Botnets: Analysis, Detection, and Mitigation." In Network Security Technologies: Design and Applications, edited by Abdelmalek Amine, Otmane Ait Mohamed, and Boualem Benatallah, 204-223. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4789-3.ch012

Export Reference

Mendeley
Favorite

Abstract

Recent malicious attempts are intended to get financial benefits through a large pool of compromised hosts, which are called software robots or simply bots. A group of bots, referred to as a botnet, is remotely controllable by a server and can be used for sending spam emails, stealing personal information, and launching DDoS attacks. Growing popularity of botnets compels to find proper countermeasures, but existing defense mechanisms hardly catch up with the speed of botnet technologies. Bots are constantly and automatically changing their signatures to successfully avoid the detection. Therefore, it is necessary to analyze the weaknesses of existing defense mechanisms to find the gap and then design new framework of botnet detection that integrates effective approaches. To get a deep insight into the inner-working of botnets and to understand their architecture, the authors analyze some sophisticated sample botnets. In this chapter, they propose a comprehensive botnet analysis and reporting framework that is based on sound theoretical background.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.