Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Survey and taxonomy of botnet research through life-cycle

RA Rodríguez-Gómez, G Maciá-Fernández… - ACM Computing …, 2013 - dl.acm.org
Of all current threats to cybersecurity, botnets are at the top of the list. In consequence,
interest in this problem is increasing rapidly among the research community and the number …

Eclipse attacks on {Bitcoin's}{peer-to-peer} network

E Heilman, A Kendler, A Zohar… - 24th USENIX security …, 2015 - usenix.org
We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary
controlling a sufficient number of IP addresses to monopolize all connections to and from a …

Botnet business models, takedown attempts, and the darkweb market: A survey

D Georgoulias, JM Pedersen, M Falch… - ACM Computing …, 2023 - dl.acm.org
Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb
marketplaces to promote and provide their services, which can vary from renting or buying a …

New facets of mobile botnet: architecture and evaluation

M Anagnostopoulos, G Kambourakis… - International Journal of …, 2016 - Springer
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of
any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced …

A comprehensive study of email spam botnet detection

WZ Khan, MK Khan, FTB Muhaya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …

Design of SMS commanded-and-controlled and P2P-structured mobile botnets

Y Zeng, KG Shin, X Hu - Proceedings of the fifth ACM conference on …, 2012 - dl.acm.org
Botnets are one of the most serious security threats to the Internet and personal computer
(PC) users. Although botnets have not yet caused major outbreaks in the mobile world, with …

A reconfigurable shared scan-in architecture

S Samaranayake, E Gizdarski… - … . 21st VLSI Test …, 2003 - ieeexplore.ieee.org
In this paper, an efficient technique for test data volume reduction based on the shared scan-
in (Illinois Scan) architecture and the scan chain reconfiguration (Dynamic Scan) …

LNBot: a covert hybrid botnet on bitcoin lightning network for fun and profit

A Kurt, E Erdin, M Cebe, K Akkaya… - … Security–ESORICS 2020 …, 2020 - Springer
While various covert botnets were proposed in the past, they still lack complete
anonymization for their servers/botmasters or suffer from slow communication between the …

5G Aviation Networks Using Novel AI Approach for DDoS Detection.

H Whitworth, S Al-Rubaye, A Tsourdos, J Jiggins - IEEE Access, 2023 - ieeexplore.ieee.org
The advent of Fifth Generation (5G) technology has ushered in a new era of advancements
in the aviation sector. However, the introduction of smart infrastructure has significantly …