• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Ke, Fang Binxing, Cui Xiang, Liu Qixu. Study of Botnets Trends[J]. Journal of Computer Research and Development, 2016, 53(10): 2189-2206. DOI: 10.7544/issn1000-1239.2016.20160419
Citation: Li Ke, Fang Binxing, Cui Xiang, Liu Qixu. Study of Botnets Trends[J]. Journal of Computer Research and Development, 2016, 53(10): 2189-2206. DOI: 10.7544/issn1000-1239.2016.20160419

Study of Botnets Trends

More Information
  • Published Date: September 30, 2016
  • Botnets, as one of the most effective platforms to launch cyber-attacks, pose great threats to the security of today’s cyber-space. Despite the fact that remarkable progress had been made in the researches of botnets’ both attack and defense technologies in recent years, the forms and command and control mechanisms of botnets, however, as Internet applications are put into a wider variety of uses and communication technologies upgraded more rapidly than ever, are also undergoing constant changes, bringing new challenges to defenders. For this reason, an in-depth investigation of botnets’ working mechanisms and development is of great significance to deal with the threats posed by botnets. This paper, with the attack technologies of botnets as its main focus, gives an comprehensive introduction of the working mechanisms of botnets in terms of its definition, transmission, lifecycle, malicious behaviors and command and control channels, and divides the botnets’ development into two stages, namely, attacks to traditional PC and extensive attacks, with the technological features, behavioral characteristics, case studies and evolutionary patterns of each stage elaborated in a detailed manner. After a summary of existing work on the defense of botnets with the limitations of each approach discussed, possible future attempts are presented.
  • Related Articles

    [1]Wang Mengru, Yao Yunzhi, Xi Zekun, Zhang Jintian, Wang Peng, Xu Ziwen, Zhang Ningyu. Safety Analysis of Large Model Content Generation Based on Knowledge Editing[J]. Journal of Computer Research and Development, 2024, 61(5): 1143-1155. DOI: 10.7544/issn1000-1239.202330965
    [2]Shi Jiaoli, Huang Chuanhe, He Kai, Shen Xieyang, Hua Chao. An Access Control Method Supporting Multi-User Collaborative Edit in Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(7): 1603-1616. DOI: 10.7544/issn1000-1239.2017.20151135
    [3]Wang Shaopeng, Wen Yingyou, Li Zhi, and Zhao Hong. A Fast Processing Algorithm on Section Disjoint Query of Data Stream[J]. Journal of Computer Research and Development, 2014, 51(5): 1136-1148.
    [4]Zhu Huaijie, Wang Jiaying, Wang Bin, and Yang Xiaochun. Location Privacy Preserving Obstructed Nearest Neighbor Queries[J]. Journal of Computer Research and Development, 2014, 51(1): 115-125.
    [5]Yang Zexue, Hao Zhongxiao. Group Obstacle Nearest Neighbor Query in Spatial Database[J]. Journal of Computer Research and Development, 2013, 50(11): 2455-2462.
    [6]Zhu Yangyong, Dai Dongbo, and Xiong Yun. A Survey of the Research on Similarity Query Technique of Sequence Data[J]. Journal of Computer Research and Development, 2010, 47(2): 264-276.
    [7]Wang Bin, Guo Qing, Li Zhongbo, Yang Xiaochun. Index Structures for Supporting Block Edit Distance[J]. Journal of Computer Research and Development, 2010, 47(1): 191-199.
    [8]Xu Shifeng, Gao Jun, Yang Dongqing, and Wang Tengjiao. Pass-Count-Based Path Query on Big Graph Datasets[J]. Journal of Computer Research and Development, 2010, 47(1): 96-103.
    [9]Yang Yuedong, Wang Lili, and Hao Aimin. Motion String: A Motion Capture Data Representation for Behavior Segmentation[J]. Journal of Computer Research and Development, 2008, 45(3): 527-534.
    [10]He Honghui, Wang Lizhen, and Zhou Lihua. pgi-distance: An Efficient Method Supporting Parallel KNN-join Process[J]. Journal of Computer Research and Development, 2007, 44(10): 1774-1781.

Catalog

    Article views (2497) PDF downloads (1532) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return