4.3 Review

Survey on Botnet Detection Techniques: Classification, Methods, and Evaluation

期刊

MATHEMATICAL PROBLEMS IN ENGINEERING
卷 2021, 期 -, 页码 -

出版社

HINDAWI LTD
DOI: 10.1155/2021/6640499

关键词

-

资金

  1. National Key Research and Development Project [2016YFB08011601]

向作者/读者索取更多资源

This survey analyzes and compares the most important efforts in the botnet detection area, studies the mechanism characteristics of botnet technology, provides a new global capability measurement standard, and discusses the challenges and future trends in the field.
With the continuous evolution of the Internet, as well as the development of the Internet of Things, smart terminals, cloud platforms, and social platforms, botnets showing the characteristics of platform diversification, communication concealment, and control intelligence. This survey analyzes and compares the most important efforts in the botnet detection area in recent years. It studies the mechanism characteristics of botnet architecture, life cycle, and command and control channel and provides a classification of botnet detection techniques. It focuses on the application of advanced technologies such as deep learning, complex network, swarm intelligence, moving target defense (MTD), and software-defined network (SDN) for botnet detection. From the four dimensions of service, intelligence, collaboration, and assistant, a common bot detection evaluation system (CBDES) is proposed, which defines a new global capability measurement standard. Combing with expert scores and objective weights, this survey proposes quantitative evaluation and gives a visual representation for typical detection methods. Finally, the challenges and future trends in the field of botnet detection are summarized.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Peertrap: An Unstructured P2P Botnet Detection Framework Based on SAW Community Discovery

Ying Xing, Hui Shu, Fei Kang, Hao Zhao

Summary: Botnet has become a serious threat to the internet ecosystem, and detecting and tracking these botnets is crucial. This article proposes a botnet detection framework, Peertrap, based on self-avoiding random walks (SAW) community detection. The framework can accurately detect P2P bots even with incomplete topological information.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)

Article Computer Science, Information Systems

MinSIB: Minimized static instrumentation for fuzzing binaries

Yeming Gu, Hui Shu, Pan Yang, Rongkuan Ma

Summary: This paper presents MinSIB, a toolkit for reducing static binary instrumentation overhead, which better focuses on functional areas and security-related basic blocks, and improves the efficiency of fuzzing.

COMPUTERS & SECURITY (2022)

Article Computer Science, Information Systems

COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics

Yang Li, Fei Kang, Hui Shu, Xiaobing Xiong, Zihan Sha, Zhonghang Sui

Summary: With the rapid development of reverse engineering technology, software security issues have become an urgent financial loss problem. The current development of code obfuscation mainly focuses on increasing the complexity of code structure, while neglecting the protection of program semantic information. This paper proposes a software protection method based on program semantic information called COOPS, which reconstructs the semantic relationship within the program by establishing a switch relationship between intrafunction control flow and interfunction calling. The evaluation results demonstrate that COOPS exhibits strong resistance to program similarity analysis techniques and significantly improves the level of software protection.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Computer Science, Information Systems

SpotFuzzer: Static Instrument and Fuzzing Windows COTs

Yeming Gu, Hui Shu, Rongkuan Ma, Lin Yan

Summary: The security research on Windows has been neglected in the academic field, where most new methods are designed for Linux and cannot be easily applied to Windows. This paper introduces SpotInstr, a lightweight static instrumentation tool for Windows binaries, which can quickly and effectively instrument most Windows PE programs. It also proposes a selective instrumentation method based on a set of filters, and presents SpotFuzzer, a system utilizing SpotInstr for fuzzing Windows binaries, demonstrating their superior performance and stability.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Computer Science, Hardware & Architecture

Model of Execution Trace Obfuscation Between Threads

Zihan Sha, Hui Shu, Xiaobing Xiong, Fei Kang

Summary: This paper presents an obfuscation strategy called execution trace obfuscation, which switches program execution trace between multiple threads to realize equivalent code transformation. Further cascade encryption of a function and key removal interferes with advanced reverse analysis tools effectively.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

暂无数据