Peer-to-Peer botnet investigation: A review

2Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Botnets have become the tool of choice to conduct a number of online attacks, e.g., distributed denial of service (DDoS), malware distribution, email spamming, phishing, advertisement click fraud, brute-force password attacks, etc. Criminals involved in conducting their craft online all share one common goal; not to get caught. Botnet design, as a result, has moved away from the traditional, more traceable and easily blocked client/server paradigm towards a decentralized Peer-to-Peer (P2P) based communication system. P2P Internet communication technologies lend themselves well to be used in the world of botnet propagation and control due to the level of anonymity they award to the botmaster. For the cybercrime investigator, identifying the perpetrator of these P2P controlled crimes has become significantly more difficult. This paper outlines the state-of-the-art in P2P botnet investigation. © 2012 Springer Science+Business Media Dordrecht.

Cite

CITATION STYLE

APA

Scanlon, M., & Kechadi, T. (2012). Peer-to-Peer botnet investigation: A review. In Lecture Notes in Electrical Engineering (Vol. 179 LNEE, pp. 231–238). https://doi.org/10.1007/978-94-007-5064-7_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free