skip to main content
10.1145/2905055.2905360acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Advance Persistent Threat: Botnet

Published:04 March 2016Publication History

ABSTRACT

Growth of internet era and corporate sector dealings communication online has introduced crucial security challenges in cyber space. Statistics of recent large scale attacks defined new class of threat to online world, advanced persistent threat (APT) able to impact national security and economic stability of any country. From all APTs, botnet is one of the well-articulated and stealthy attacks to perform cybercrime. Botnet owners and their criminal organizations are continuously developing innovative ways to infect new targets into their networks and exploit them. The concept of botnet refers collection of compromised computers (bots) infected by automated software robots, that interact to accomplish some distributed task which run without human intervention for illegal purposes. They are mostly malicious in nature and allow cyber criminals to control the infected machines remotely without the victim's knowledge. They use various techniques, communication protocols and topologies in different stages of their lifecycle; also specifically they can upgrade their methods at any time. Botnet is global in nature and their target is to steal or destroy valuable information from organizations as well as individuals. In this paper we present real world botnet (APTs) survey.

References

  1. Sheharbano Khattak, Naurin Rasheed Ramay, Kamran Riaz Khan, Affan A. Syed, and Syed Ali Khayam 2014. Taxonomy of Botnet Behavior, Detection, and Defense. IEEE Communications Surveys & Tutorials, Vol. 16, No. 2, Second Quarter 2014Google ScholarGoogle ScholarCross RefCross Ref
  2. Tuhin Paul, Rohit Tyagi, B. S. Manoj 2014. Fast-flux Botnet Detection from Network Traffic, Indian Institute of Space Science and Technology, Thanudas B., Vikram Sarabhai Space Centre, ISRO, Thiruvananthapuram, India, 2014 Annual IEEE India Conference (INDICON)Google ScholarGoogle Scholar
  3. M. Tariq Banday, Nisar A. Shah. Study of Botnets and Their Threats to Internet Security, University of Kashmir, India, Jameel A. Qadri, BC College of North West London, UK, http://sprouts.aisnet.org/ 9--24Google ScholarGoogle Scholar
  4. G. Kirubavathi and R. Anitha 2014. Botnets: A Study and Analysis. Department of Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, India, Springer India 2014Google ScholarGoogle Scholar
  5. N. Lee 2015. Cyber Warfare: Weapon of Mass Disruption. Counterterrorism and Cyber security, DOI 10.1007/978-3-319-17244-6_9, Springer International Publishing Switzerland 2015Google ScholarGoogle Scholar
  6. N. Hoque, D. K. Bhattacharyya, J. K. Kalita 2015. Department of Computer Science and Engineering Tezpur University Nappam, Tezpur, India. IEEE 2015Google ScholarGoogle Scholar
  7. Wei Zhang, Yue-Ji Wang, Xiao-Lei Wang, 2014. A Survey of Defense against P2P Botnets. Department of Carrier-Based Aircraft, Naval Aviation Academy, Huludao, China, College of Computer, National University of Defense Technology, Changsha, China,2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing IMAGES Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Joseph Massi, Sudhir Panda, Girisha Rajappa, Senthil Selvaraj, and Swapana Revankar 2010. Botnet Detection and Mitigation. Seidenberg School of CSIS, Pace University, White Plains, NY 10605, USA, CSIS, Pace University, May 7th, 2010Google ScholarGoogle Scholar
  9. Rain Ottis 2015. Cyber Warfare Tallinn University of Technology, Tallinn, Estonia, Springer International Publishing Switzerland 2015Google ScholarGoogle Scholar
  10. APT: http://www.mcafee.com/in/resources/white-papers/wp-combat-advanced-persist-threats.pdfGoogle ScholarGoogle Scholar
  11. List of Botnet: http://www.enigmasoftware.com/top-10-botnet-threats-in-the-united-states/Google ScholarGoogle Scholar
  12. Popular Botnets: http://www.spywareinfoforum.com/topic/136252-pandemic-of-the-botnets-2015/Google ScholarGoogle Scholar
  13. Botnet Threat Report: http://www.symantec.com/security_response/publications/threatreport.jspGoogle ScholarGoogle Scholar
  14. Botnet Introduction:http://www.microsoft.com/security/pc-security/botnet.aspxGoogle ScholarGoogle Scholar
  15. Old Botnets: http://www.pearsonitcertification.com/articles/article.aspx?p=1703672Google ScholarGoogle Scholar
  16. Brief Botware activity: https://www.shadowserver.org/wiki/pmwiki.php/Stats/BotnetChartsGoogle ScholarGoogle Scholar
  17. C&C Architecture: http://resources.infosecinstitute.com/botnets-how-do-they-work-architectures-and-case-studies-part-2/Google ScholarGoogle Scholar
  18. Bot Communication: https://www.damballa.com/downloads/r_pubs/WP_Botnet_Communications_Primer.pdfGoogle ScholarGoogle Scholar
  19. APT Brief: http://www.fortinet.com/sites/default/files/solutionbrief/threats-on-the-horizon-rise-of-advanced-persistent-threats.pdfGoogle ScholarGoogle Scholar
  20. APT introduction: https://apt.securelist.com/#firstPageGoogle ScholarGoogle Scholar
  21. Country wise bot activity: http://media.kaspersky.com/en/business-security/APT-Report.pdf?icid=en-GL:ent-galleryGoogle ScholarGoogle Scholar
  22. APT anatomy: https://www.websense.com/assets/white-papers/whitepaper-websense-advanced-persistent-threats-and-other-advanced-attacks-en.pdfGoogle ScholarGoogle Scholar
  23. Sources of attack: 2015 Bot Baseline, ANA & WHITE OPSGoogle ScholarGoogle Scholar
  24. DDOS by Botnet: https://securelist.com/files/2015/05/Statistics_on_botnet-assisted_DDoS_attacks_in_Q1_2015.pdfGoogle ScholarGoogle Scholar
  25. 2015 bot activity: https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347931_GA-internet-security-threat-report-volume-20-2015-appendices.pdfGoogle ScholarGoogle Scholar
  26. List of Bot attacks: http://www.botfree.ro/en/article-botnet-assisted-attacks.htmlGoogle ScholarGoogle Scholar
  27. Sector of bot attacks: http://www.mcafee.com/in/resources/white-papers/wp-new-era-of-botnets.pdfGoogle ScholarGoogle Scholar
  28. Bot activity monitor: http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgw03057usen/WGW03057USEN.PDF?Google ScholarGoogle Scholar
  29. Introduction of Bot architecture: Anatomy of a Botnet, fortinet, whitepaper, www.fortinet.comGoogle ScholarGoogle Scholar
  30. Definitions of APT: and Advanced Persistent Threat Awareness, ISACA, trend micro, WWW.ISACA.ORG/CYBERSECURITYGoogle ScholarGoogle Scholar
  1. Advance Persistent Threat: Botnet

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
        March 2016
        843 pages
        ISBN:9781450339629
        DOI:10.1145/2905055

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 March 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate97of270submissions,36%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader