Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 12
Page No. 4089 - 4096

Survey: Botnet Impact on Cyber Net

Authors : Vanakamamidi Rama Krishna and R. Subhashini

References

Anonymous, 2010. Mariposa botnet-12.7 million bots strong-knocked offline. TechHerald.in, Mumbai, India.

Anonymous, 2010. War in the fifth domain: Are the mouse and keyboard the new weapons of conflict. The Economist, Westminster, London, UK. https://www.economist.com/briefing/2010/07/01/war-in-the-fifth-domain

Anonymous, 2010. War in the fifth domain: Are the mouse and keyboard the new weapons of conflict?. The Economist, Westminster, London, UK.

Anonymous, 2010. Zeus malware: Threat banking industry Unisys Stealth Solution Team. Unisys, Blue Bell, Pennsylvania, USA. https://botnetlegalnotice.com/citadel/files/Guerrino_Decl_Ex1.pdf

Anonymous, 2013. CryptoLocker ransomware information guide and FAQ. Bleeping Computer® LLC, Melville, New York. https://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information

Bacher, P., T. Holz, M. Kotter and G. Wicherski, 2008. Know your enemy: Tracking botnets. Master Thesis, Honeynet Project, Menlo Park, California.

Choi, H., H. Lee and H. Kim, 2009. BotGAD: Detecting botnets by capturing group activities in network traffic. Proceedings of the 4th International ICST Conference on COMmunication System SoftWAre and MiddlewaRE (COMSWARE '09), June 16-19, 2009, ACM, Dublin, Ireland, ISBN:978-1-60558-353-2, pp: 21-28.

Feily, M., A. Shahrestani and S. Ramadass, 2009. A survey of botnet and botnet detection. Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies, June 18-23, 2009, Glyfada, Athens, Greece, pp: 268-273.

Fossi, M., G. Egan, K. Haley, E. Johnson and T. Mack et al., 2011. Symantec internet security threat report trends for 2010. Symantec Internet Secur. Threat Rep., 16: 1-20.
Direct Link  |  

Ianelli, N. and A. Hackworth, 2005. Botnets as a vehicle for online Crime. Master Thesis, CERT Coordination Center, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA.

Labovitz, C., 2010. Attack severs Burma internet. Arbor Networks, Westford, Massachusetts, USA. https://asert.arbornetworks.com/attac-severs-myanmar-internet/

Liao, W.H. and C.C. Chang, 2010. Peer to peer botnet detection using data mining scheme. Proceedings of the International Conference on Internet Technology and Applications, August 20-22, 2010, Wuhan, China, pp: 1-4.

Markoff, J., 2009. Worm infects millions of computers worldwide. The New York Times, New York, USA. https://www.nytimes.com/2009/01/23/technology/internet/23worm.html

Paxton, N., G.J. Ahn and B. Chu, 2007. Towards practical framework for collecting and analyzing network-centric attacks. Proceedings of the 2007 IEEE International Conference on Information Reuse and Integration, August 13-15, 2007, IEEE, Las Vegas, Illinois, pp: 73-78.

Ramachandran, A., N. Feamster and D. Dagon, 2006. Revealing botnet membership using DNSBL counter-intelligence. Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet, July 7, 2006, San Jose, CA., USA., pp: 1-6.

Ullah, I., N. Khan and H.A. Aboalsamh, 2013. Survey on botnet: Its architecture, detection, prevention and mitigation. Proceedings of the 2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC), April 10-12, 2013, IEEE, Evry, France, ISBN:978-1-4673-5198-0, pp: 660-665.

Williams, M., 2009. UK, not North Korea, source of DDOS attacks, researcher says. IDG Communications, Framingham, Massachusetts. https://www.pcworld.com/article/168353/article.html

Zhu, Z., G. Lu, Y. Chen, Z.J. Fu, P. Roberts and K. Han, 2008. Botnet research survey. Proceedings of the 32nd Annual IEEE International on Computer Software and Applications, 28 July-August 1, 2008, Turku, pp: 967-972.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved