Model of the botnet

Authors

  • O. S. Savenko Khmelnitsky National University
  • S. M. Lysenko Khmelnitsky National University
  • A. F. Kryshchuk Khmelnitsky National University

Abstract

The generalized model of functioning of the botnet is offered in the paper. The model of bot that functions within the limits of the botnet is suggested. The acquired models take into account the life cycle of the botnet and her properties appearing in the process of functioning and allow carrying out the search of new bots on the certain computer systems.

Author Biographies

O. S. Savenko, Khmelnitsky National University

доцент, Кафедра системного програмування

S. M. Lysenko, Khmelnitsky National University

доцент, Кафедра системного програмування

A. F. Kryshchuk, Khmelnitsky National University

аспірант, Кафедра системного програмування

References

1. Oxford Dictionaries [Електронний ресурс]. — Режим доступу: http://oxforddictionaries.com.
2. Savenko O. Multi-agent Based Approach of Botnet Detection in Computer Systems / O. Savenko, S. Lysenko,
A. Kryschuk // Computer Networks, Springer Berlin Heidelberg, 19th International Conference Szczyrk Poland, 2012. —
Р. 171—180.
3. LB.UA [Электронный ресурс] : Украина — один из главных источников DDoS-атак в мире. — Режим доступа:
http://economics.lb.ua
4. Botnet Detection Based on Network Behavior / [D. Lapsely, Robert Walsh, Carl Livadas, W. Strayer Timothy]. — Springer
Science+Business Media, LLC, Botnet Detection Countering the Largest Security Threat, 2008. — 165 p.
5. Cooke E. The zombie roundup : Understanding, detecting, and disrupting botnets / E. Cooke, F. Jahanian, D. McPherson //
Wksh. Steps to Reducing Unwanted Traffic on the Internet, — 2005.
6. Borup L. Peer-to-peer botnets : A case study on Waledac / L. Borup. — Master’s thesis, Technical University of Denmark, 2009.
7. Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures? / [C. R. Davis, S. Neville,
J. M. Fernandez, J. M. Robert] // Euro. Symp. Research in Computer Security, 2008.
8. Porras P. A multi-perspective analysis of the Storm (Peacomm) worm / P. Porras, H. Saidi, V. Yegneswaran. — Tech. rep.,
Computer Science Laboratory, SRI International, 2007.
9. Measurements and mitigation of peer-to-peer-based botnets : A case study on Storm worm / [T. Holz, M. Steiner, F. Dahl,
E. Biersack, F. Freiling] // USENIX Wksh. Large-Scale Exploits and Emergent Threats, 2008.

Downloads

Abstract views: 120

How to Cite

[1]
O. S. Savenko, S. M. Lysenko, and A. F. Kryshchuk, “Model of the botnet”, Вісник ВПІ, no. 3, pp. 76–81, Jun. 2013.

Issue

Section

Information technologies and computer sciences

Metrics

Downloads

Download data is not yet available.