Botnets are one of the most important threats towards nowadays users of the Internet. The joint of malware capabilities to be exploited in the network services and the increasing number of daily transactions performed in the cloud, makes them an attractive target for cybercriminals who have evolved their old IRC-based communication channels, into decentralized P2P networks, HTTP/S botnets and even Twitter-controlled networks. Against this background, this article analyses the threat that will affect computer networks in the upcoming years by going through these different Command & Control channels used by botmasters to keep the control of their hijacked networks. © 2013 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Brezo, F., De La Puerta, J. G., Santos, I., Barroso, D., & Bringas, P. G. (2013). C&C techniques in botnet development. In Advances in Intelligent Systems and Computing (Vol. 189 AISC, pp. 97–108). Springer Verlag. https://doi.org/10.1007/978-3-642-33018-6_10
Mendeley helps you to discover research relevant for your work.