Botnet topology reconstruction: A case study

Ming Yi Liao, Jynu Hao Li, Chu Sing Yang, Min Chen, Chun Wei Tsai, Ming Cho Chang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the bot net and the infection period can be observed and analyzed so that better defense tools can be built.

Original languageEnglish
Title of host publicationProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Pages529-534
Number of pages6
DOIs
Publication statusPublished - 2012
Event6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 - Palermo, Italy
Duration: 2012 Jul 42012 Jul 6

Publication series

NameProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012

Other

Other6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Country/TerritoryItaly
CityPalermo
Period12-07-0412-07-06

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Communication

Fingerprint

Dive into the research topics of 'Botnet topology reconstruction: A case study'. Together they form a unique fingerprint.

Cite this