Model of the botnet
Abstract
The generalized model of functioning of the botnet is offered in the paper. The model of bot that functions within the limits of the botnet is suggested. The acquired models take into account the life cycle of the botnet and her properties appearing in the process of functioning and allow carrying out the search of new bots on the certain computer systems.References
1. Oxford Dictionaries [Електронний ресурс]. — Режим доступу: http://oxforddictionaries.com.
2. Savenko O. Multi-agent Based Approach of Botnet Detection in Computer Systems / O. Savenko, S. Lysenko,
A. Kryschuk // Computer Networks, Springer Berlin Heidelberg, 19th International Conference Szczyrk Poland, 2012. —
Р. 171—180.
3. LB.UA [Электронный ресурс] : Украина — один из главных источников DDoS-атак в мире. — Режим доступа:
http://economics.lb.ua
4. Botnet Detection Based on Network Behavior / [D. Lapsely, Robert Walsh, Carl Livadas, W. Strayer Timothy]. — Springer
Science+Business Media, LLC, Botnet Detection Countering the Largest Security Threat, 2008. — 165 p.
5. Cooke E. The zombie roundup : Understanding, detecting, and disrupting botnets / E. Cooke, F. Jahanian, D. McPherson //
Wksh. Steps to Reducing Unwanted Traffic on the Internet, — 2005.
6. Borup L. Peer-to-peer botnets : A case study on Waledac / L. Borup. — Master’s thesis, Technical University of Denmark, 2009.
7. Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures? / [C. R. Davis, S. Neville,
J. M. Fernandez, J. M. Robert] // Euro. Symp. Research in Computer Security, 2008.
8. Porras P. A multi-perspective analysis of the Storm (Peacomm) worm / P. Porras, H. Saidi, V. Yegneswaran. — Tech. rep.,
Computer Science Laboratory, SRI International, 2007.
9. Measurements and mitigation of peer-to-peer-based botnets : A case study on Storm worm / [T. Holz, M. Steiner, F. Dahl,
E. Biersack, F. Freiling] // USENIX Wksh. Large-Scale Exploits and Emergent Threats, 2008.
2. Savenko O. Multi-agent Based Approach of Botnet Detection in Computer Systems / O. Savenko, S. Lysenko,
A. Kryschuk // Computer Networks, Springer Berlin Heidelberg, 19th International Conference Szczyrk Poland, 2012. —
Р. 171—180.
3. LB.UA [Электронный ресурс] : Украина — один из главных источников DDoS-атак в мире. — Режим доступа:
http://economics.lb.ua
4. Botnet Detection Based on Network Behavior / [D. Lapsely, Robert Walsh, Carl Livadas, W. Strayer Timothy]. — Springer
Science+Business Media, LLC, Botnet Detection Countering the Largest Security Threat, 2008. — 165 p.
5. Cooke E. The zombie roundup : Understanding, detecting, and disrupting botnets / E. Cooke, F. Jahanian, D. McPherson //
Wksh. Steps to Reducing Unwanted Traffic on the Internet, — 2005.
6. Borup L. Peer-to-peer botnets : A case study on Waledac / L. Borup. — Master’s thesis, Technical University of Denmark, 2009.
7. Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures? / [C. R. Davis, S. Neville,
J. M. Fernandez, J. M. Robert] // Euro. Symp. Research in Computer Security, 2008.
8. Porras P. A multi-perspective analysis of the Storm (Peacomm) worm / P. Porras, H. Saidi, V. Yegneswaran. — Tech. rep.,
Computer Science Laboratory, SRI International, 2007.
9. Measurements and mitigation of peer-to-peer-based botnets : A case study on Storm worm / [T. Holz, M. Steiner, F. Dahl,
E. Biersack, F. Freiling] // USENIX Wksh. Large-Scale Exploits and Emergent Threats, 2008.
Downloads
-
PDF (Українська)
Downloads: 138
Abstract views: 124
How to Cite
[1]
O. S. Savenko, S. M. Lysenko, and A. F. Kryshchuk, “Model of the botnet”, Вісник ВПІ, no. 3, pp. 76–81, Jun. 2013.
Issue
Section
Information technologies and computer sciences
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).