C&C techniques in botnet development

1Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Botnets are one of the most important threats towards nowadays users of the Internet. The joint of malware capabilities to be exploited in the network services and the increasing number of daily transactions performed in the cloud, makes them an attractive target for cybercriminals who have evolved their old IRC-based communication channels, into decentralized P2P networks, HTTP/S botnets and even Twitter-controlled networks. Against this background, this article analyses the threat that will affect computer networks in the upcoming years by going through these different Command & Control channels used by botmasters to keep the control of their hijacked networks. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Brezo, F., De La Puerta, J. G., Santos, I., Barroso, D., & Bringas, P. G. (2013). C&C techniques in botnet development. In Advances in Intelligent Systems and Computing (Vol. 189 AISC, pp. 97–108). Springer Verlag. https://doi.org/10.1007/978-3-642-33018-6_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free