New facets of mobile botnet: architecture and evaluation
M Anagnostopoulos, G Kambourakis… - International Journal of …, 2016 - Springer
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of
any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced …
any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced …
LNBot: a covert hybrid botnet on bitcoin lightning network for fun and profit
While various covert botnets were proposed in the past, they still lack complete
anonymization for their servers/botmasters or suffer from slow communication between the …
anonymization for their servers/botmasters or suffer from slow communication between the …
[图书][B] Botnets: Architectures, countermeasures, and challenges
This book provides solid, state-of-the-art contributions from both scientists and practitioners
working on botnet detection and analysis, including botnet economics. It presents original …
working on botnet detection and analysis, including botnet economics. It presents original …
The devil is in the detail: SDP-driven malformed message attacks and mitigation in SIP ecosystems
VoIP services, in general, and session initiation protocol (SIP) ones, in particular, continue to
grow at a fast pace and have already become a key component of next-generation networks …
grow at a fast pace and have already become a key component of next-generation networks …
Botnet command and control architectures revisited: Tor hidden services and fluxing
M Anagnostopoulos, G Kambourakis… - … Engineering–WISE 2017 …, 2017 - Springer
Botnet armies constitute a major and continuous threat to the Internet. Their number,
diversity, and power grows with each passing day, and the last years we are witnessing their …
diversity, and power grows with each passing day, and the last years we are witnessing their …
Unified description for network information hiding methods
Until now hiding methods in network steganography have been described in arbitrary ways,
making them difficult to compare. For instance, some publications describe classical channel …
making them difficult to compare. For instance, some publications describe classical channel …
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network
While various covert botnets were proposed in the past, they still lack complete
anonymization for their servers/botmasters or suffer from slow communication between the …
anonymization for their servers/botmasters or suffer from slow communication between the …
Advanced information hiding techniques for modern botnets
This chapter discusses how information hiding and steganography techniques can be used
to make botnets stealthier and more dangerous. It focuses on techniques that can be used …
to make botnets stealthier and more dangerous. It focuses on techniques that can be used …
Blockchain-Based Botnets for Command-and-Control Resilience
W Wang, X Ma - Botnets, 2019 - taylorfrancis.com
This chapter focuses on four blockchain-based Command-and-Control (C&C) mechanisms:
ZombieCoin, Floating C&C Server, ChainChannels, and Unblockable Chains. It presents …
ZombieCoin, Floating C&C Server, ChainChannels, and Unblockable Chains. It presents …
Botnet Architectures: A State-of-the-Art Review
B Al-Duwairi, M Jarrah - Botnets, 2019 - taylorfrancis.com
This chapter focuses on the emerging and predominant threat of botnets. The botnet
formation starts by recruiting as many vulnerable machines as possible to become part of a …
formation starts by recruiting as many vulnerable machines as possible to become part of a …