New facets of mobile botnet: architecture and evaluation

M Anagnostopoulos, G Kambourakis… - International Journal of …, 2016 - Springer
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of
any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced …

LNBot: a covert hybrid botnet on bitcoin lightning network for fun and profit

A Kurt, E Erdin, M Cebe, K Akkaya… - … Security–ESORICS 2020 …, 2020 - Springer
While various covert botnets were proposed in the past, they still lack complete
anonymization for their servers/botmasters or suffer from slow communication between the …

[图书][B] Botnets: Architectures, countermeasures, and challenges

G Kambourakis, M Anagnostopoulos, W Meng, P Zhou - 2019 - books.google.com
This book provides solid, state-of-the-art contributions from both scientists and practitioners
working on botnet detection and analysis, including botnet economics. It presents original …

The devil is in the detail: SDP-driven malformed message attacks and mitigation in SIP ecosystems

Z Tsiatsikas, G Kambourakis, D Geneiatakis… - IEEE …, 2018 - ieeexplore.ieee.org
VoIP services, in general, and session initiation protocol (SIP) ones, in particular, continue to
grow at a fast pace and have already become a key component of next-generation networks …

Botnet command and control architectures revisited: Tor hidden services and fluxing

M Anagnostopoulos, G Kambourakis… - … Engineering–WISE 2017 …, 2017 - Springer
Botnet armies constitute a major and continuous threat to the Internet. Their number,
diversity, and power grows with each passing day, and the last years we are witnessing their …

Unified description for network information hiding methods

S Wendzel, W Mazurczyk, S Zander - arXiv preprint arXiv:1512.07438, 2015 - arxiv.org
Until now hiding methods in network steganography have been described in arbitrary ways,
making them difficult to compare. For instance, some publications describe classical channel …

D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network

A Kurt, E Erdin, K Akkaya, S Uluagac… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
While various covert botnets were proposed in the past, they still lack complete
anonymization for their servers/botmasters or suffer from slow communication between the …

Advanced information hiding techniques for modern botnets

L Caviglione, W Mazurczyk, S Wendzel - Botnets, 2019 - taylorfrancis.com
This chapter discusses how information hiding and steganography techniques can be used
to make botnets stealthier and more dangerous. It focuses on techniques that can be used …

Blockchain-Based Botnets for Command-and-Control Resilience

W Wang, X Ma - Botnets, 2019 - taylorfrancis.com
This chapter focuses on four blockchain-based Command-and-Control (C&C) mechanisms:
ZombieCoin, Floating C&C Server, ChainChannels, and Unblockable Chains. It presents …

Botnet Architectures: A State-of-the-Art Review

B Al-Duwairi, M Jarrah - Botnets, 2019 - taylorfrancis.com
This chapter focuses on the emerging and predominant threat of botnets. The botnet
formation starts by recruiting as many vulnerable machines as possible to become part of a …