The Community for Technology Leaders
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2013)
Melbourne, VIC Australia
July 16, 2013 to July 18, 2013
pp: 257-264
Tianzuo Wang , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Huaimin Wang , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Bo Liu , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Peichang Shi , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
ABSTRACT
As complex, flexible and efficient platforms for network attacks, botnets are considered as one of the most serious threats to current Internet security. The evolution and diversification of botnets call for a clear and fine grained taxonomy, but existing taxonomies are either incomplete or overlapping. In order to classify botnets accurately, we propose a concept called control structure to exactly and uniformly describe how botnets are controlled by botmasters. From the point of control structure, we classify botnets into certain patterns. Our taxonomy not only helps to understand botnets better, but also is useful for defenders when considering how to take down a botnet. Further, through comparison between different patterns, we predict that the P pattern and F-(O, P) pattern would be the most important trends for botnets, and the F layer would less likely appear without a P layer.
INDEX TERMS
Servers, Taxonomy, Topology, Erbium, Barium, Security, Resilience,taxonomy, control structure, botnet, pattern
CITATION
Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi, "What is the Pattern of a Botnet?", 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, vol. 00, no. , pp. 257-264, 2013, doi:10.1109/TrustCom.2013.35
173 ms
(Ver 3.3 (11022016))