skip to main content
10.1145/3314545.3314562acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccdaConference Proceedingsconference-collections
research-article

An Analysis of Botnet Models

Authors Info & Claims
Published:14 March 2019Publication History

ABSTRACT

Botnets are a form of cyber threat responsible for massive Distributed Denial of Service (DDoS) attacks, delivery of malicious payloads like ransomware, and dissemination of spam which might be used for phishing. Botnets are closely associated with the Internet of Things (IoT), particularly IoT devices, which when compromised can become part of a botnet. The incredible increase in IoT devices and the close relationship of botnets to other attacks cause botnets to be a significant source of cyber threat. Because botnets are complex and evolving, their detection and mitigation has remained a challenge. To address that challenge, models have been constructed for simulation and analysis. This paper will examine existing botnet models and their role in improving mitigation.

References

  1. Akinrolabu, O., Agrafiotis, I., & Erola, A. (2018). The challenge of detecting sophisticated attacks: Insights from SOC analysts. Proceedings of the International Conference on Availability, Reliability and Security (ARES'18), Hamburg, Germany, 55, 1--9. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Allcott, H., & Gentzkow, M. (2017). Social media and fake news in the 2016 election. The Journal of Economic Perspectives, 31(2), 211--235.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bottazzi, G., & Me, G. (2014). The botnet revenue model. Proceedings of the 7th International Conference on Security of Information and Networks (SIN '14), Glasgow, Scotland, UK, 459--465. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cerchiello, P., & Giudici, P. (2012). Non parametric statistical models for on-line text classification. Advances in Data Analysis and Classification, 6(4), 277--288.Google ScholarGoogle ScholarCross RefCross Ref
  5. Chowdhury, S., Khanzadeh, M., Akula, R., Zhang, F., Zhang, S., Medal, H., Marufuzzaman, & Bian, L. (2017). Botnet detection using graph-based feature clustering. Journal of Big Data, 4(1), 1--23.Google ScholarGoogle ScholarCross RefCross Ref
  6. Divita, J., & Hallman, R. (2017). An approach to botnet malware detection using nonparametric Bayesian methods. Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES'17), Reggio Calabria, Italy, 75, 1--9. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. El Mir, I., Kim, D., & Haqiq, A. (2017). Towards a stochastic model for integrated detection and filtering of DoS attacks in cloud environments. Proceedings of the 2nd International Conference on Big Data, Cloud and Applications (BDCA'17), Tetouan, Morocco, 10, 1--6. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. European Union Agency for Network and Information Security (ENISA). (2019). ENISA threat landscape report 2018: 15 top cyber-threats and trends. Heraklion: ENISA.Google ScholarGoogle Scholar
  9. Ganguli, S., & Friedman, T. (2017). IoT technology disruptions: A Gartner trend insight report (Report ID G00331334). Stamford, CT: Gartner. https://www.gartner.com/en/doc/3738060-iot-technology-disruptionsGoogle ScholarGoogle Scholar
  10. Great Internet Mersenne Prime Search (GIMPS). (2018). GIMPS history. GIMPS. https://www.mersenne.org/various/history.phpGoogle ScholarGoogle Scholar
  11. Hogben, G. (Ed.), Plohmann, D., Gerhards-Padilla, E., Leder, F. (2011). Botnets: Measurement, Detection, Disinfection and Defense. Heraklion: ENISAGoogle ScholarGoogle Scholar
  12. Honeynet Project. (2004). Know your enemy; learning about security threats (2nd ed.). Boston, MA: Addison-Wesley.Google ScholarGoogle Scholar
  13. Faloutsos, M. (2013). Detecting malware with graph-based methods: traffic classification, botnets, and Facebook scams. Proceedings of the 22nd International Conference on World Wide Web (WWW '13 Companion), Rio de Janeiro, Brazil, 495--496. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Feily, M., Shahrestani, A., & Ramadass, S. (2009). A survey of botnet and botnet detection. Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '09), Athens/Glyfada, Greece, 268--273. Washington, DC: IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Grizzard, J., Sharma, V., Nunnery, C., Kang, B., & Dagon, D. (2007). Peer-to-peer botnets: overview and case study. Proceedings of the First Conference on Hot Topics in Understanding Botnets (HotBots'07). Cambridge, MA, 1(1). Berkeley, CA: USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hoang, X., & Nguyen, Q. (2018). Botnet detection based on machine learning techniques using DNS query data. Future Internet, 10, 43.Google ScholarGoogle ScholarCross RefCross Ref
  17. Iliofotou, M., Pappu, P., Faloutsos, M., Mitzenmacher, M., Singh, S., & Varghese, G. (2007). Network monitoring using traffic dispersion graphs (TDGs). Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC '07), San Diego, CA, 315--320. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Internet Society. (2015). Policy brief: Botnets. Reston, VA: Internet Society.Google ScholarGoogle Scholar
  19. Jerkins, J., & Stupiansky, J. (2018). Mitigating IoT insecurity with inoculation epidemics. Proceedings of the ACMSE 2018 Conference (ACMSE '18), Richmond, KY, 4, 1--6. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kephart, J., & White, S. (1993). Measuring and modeling computer virus prevalence. Proceedings of the 1993 IEEE Computer Security Symposium on Research in Security and Privacy, Oakland, CA, 2--15. New York, NY: Institute of Electrical and Electronic Engineers (IEEE). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Khosroshahy, M., Ali, M.K.M., & Qiu, D. (2013). The SIC botnet lifecycle model: A step beyond traditional epidemiological models. Computer Networks, 57(2), 404--421. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kolokoltsov, V. N., & Bensoussan, A. (2016). Mean-field-game model for botnet defense in cyber-security. Applied Mathematics & Optimization, 74(3), 669--692.Google ScholarGoogle ScholarCross RefCross Ref
  23. Korpela, E., Werthimer, D., Anderson, D., Cobb, J., & Leboisky, M. (2001). SETI@home-massively distributed computing for SETI. Computing in Science & Engineering, 3(1), 78--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Laurent, G. (2018, October 4). What is bot management? ORACLE Dyn. https://dyn.com/blog/what-is-bot-management/Google ScholarGoogle Scholar
  25. Li, Z., & Liao, Q. (2014). Toward a monopoly botnet market. Information Security Journal: A Global Perspective, 23(4-6), 159--171.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Li, Z., Liao, Q., Striegel, A. (2009) Botnet economics: Uncertainty matters. In Johnson, M. E. (Ed.) Managing information risk and the economics of security. (pp. 245--267). Springer, Boston, MAGoogle ScholarGoogle ScholarCross RefCross Ref
  27. Liu, J., Xiao, Y., Ghaboosi, K., Deng, H., & Zhang, J. (2009). Botnet: Classification, attacks, detection, tracing, and preventive measures. EURASIP Journal on Wireless Communications and Networking, 2009(1), 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Lu, C., & Brooks, R. (2011). Botnet traffic detection using hidden Markov models. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CIIRW'11), Oak Ridge, TN, 31. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Rodríguez-Gómez, R., Maciá-Fernández, G., & García-Teodoro, P. (2013). Survey and taxonomy of botnet research through life-cycle. ACM Computing Surveys (CSUR), 45(4), 1--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Silva, S. S. C., Silva, R. M. P., Pinto, R. C. G., & Salles, R. M. (2013). Botnets: A survey. Computer Networks, 57(2), 378--403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Song, L., Jin, Z., Sun, G. (2011). Modeling and analyzing of botnet interactions. Physica A: Statistical Mechanics and its Applications, 390(2), 347--358.Google ScholarGoogle Scholar
  32. Spitz, D., & Hunter, S. D. (2005). Contested codes: The social construction of Napster. The Information Society, 21(3), 169--180.Google ScholarGoogle ScholarCross RefCross Ref
  33. Tedeschi, L. (2006) Assessment of the adequacy of mathematical models. Agricultural Systems, 89(2-3), 225--247.Google ScholarGoogle ScholarCross RefCross Ref
  34. Turiel, A. (2017, July 17). Legitimate botnets do exist. Cyren. https://www.cyren.com/blog/articles/legitimate-botnets-do-existGoogle ScholarGoogle Scholar
  35. van Roosmalen, J., Vranken, H., van Eekelen, M. (2018). Applying deep learning on packet flows for botnet detection. Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC '18), Pau, France, 1629--1636. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Venkatachalam, N., & Anitha, R. (2017). A multi-feature approach to detect stegobot: A covert multimedia social network botnet. Multimedia Tools and Applications, 76(4), 6079--6096. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Wang, Y., Ma, J., Zhang, L., Ji, W., Lu, D., & Hei, X. (2016). Dynamic game model of botnet DDoS attack and defense. Security and Communication Networks, 9(16), 3127--3140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Wüchner, T., Ochoa, M., Golagha, M., Srivastava, G., Schreck, T., & Pretschner, A. (2016). MalFlow: Identification of C&C servers through host-based data flow profiling. Proceedings of the 31st Annual ACM Symposium on Applied Computing (SAC'16), Pisa, Italy, 2087--2094. New York, NY: Association for Computing Machinery (ACM). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Analysis of Botnet Models

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICCDA '19: Proceedings of the 2019 3rd International Conference on Compute and Data Analysis
          March 2019
          163 pages
          ISBN:9781450366342
          DOI:10.1145/3314545

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 March 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader