Botnets : architectures, countermeasures, and challenges
Author(s)
Bibliographic Information
Botnets : architectures, countermeasures, and challenges
(Series in security, privacy, and trust)
CRC Press, c2020
- : hbk
Available at / 1 libraries
-
No Libraries matched.
- Remove all filters.
Note
Other editors: Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
Includes bibliographical references and index
Description and Table of Contents
Description
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
Table of Contents
Contents
Preface .......................................................................................................... vii
About the Editors ...........................................................................................ix
Contributors...................................................................................................xi
1 Botnet Architectures: A State-of-the-Art Review.................................... 1
BASHEER AL-DUWAIR AND MOATH JARRAH
2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33
PASCAL GEENENS
3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101
PASCAL GEENENS
4 Advanced Information Hiding Techniques for Modern Botnets ....... 165
LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN
WENDZEL
5 Steganography Techniques for Command and Control
(C2) Channels.................................................................................... 189
JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI
6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217
WEIZHI WANG AND XIAOBO MA
7 Detecting Botnets and Unknown Network Attacks in
Big Traffic Data ................................................................................. 237
LUIS SACRAMENTO, IBERIA MEDEIROS, JOAO BOTA, AND MIGUEL
CORREIA
8 Domain Generation Algorithm Detection Techniques through
Network Analysis and Machine Learning .......................................... 269
FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA
9 Identifying IoT-Based Botnets: A Microservice Architecture for
IoT Management and Security........................................................... 293
THARUN KAMMARA AND MELODY MOH
10 Understanding and Detecting Social Botnet.......................................327
YUEDE JI AND QIANG LI
11 Use of Botnets for Mining Cryptocurrencies ......................................359
RENITA MURIMI
12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387
GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND
GIUSEPPE GIULIO RUTIGLIANO
Index............................................................................................................403
by "Nielsen BookData"