咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Monitoring Peer-to-Peer Botnet... 收藏

Monitoring Peer-to-Peer Botnets:Requirements,Challenges,and Future Works

作     者:Arkan Hammoodi Hasan Kabla Mohammed Anbar Selvakumar Manickam Alwan Ahmed Abdulrahman Alwan Shankar Karuppayah 

作者机构:National Advanced IPv6 Centre(NAv6)Universiti Sains MalaysiaPulau Pinang11800Malaysia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2023年第75卷第5期

页      面:3375-3398页

核心收录:

学科分类:0402[教育学-心理学(可授教育学、理学学位)] 0303[法学-社会学] 08[工学] 080401[工学-精密仪器及机械] 0804[工学-仪器科学与技术] 080402[工学-测试计量技术及仪器] 0838[工学-公安技术] 

基  金:This work was supported by the Ministry of Higher Education Malaysia’s Fundamental Research Grant Scheme under Grant FRGS/1/2021/ICT07/USM/03/1 

主  题:P2P networks botnet P2P botnet botnet monitoring honeypot crawlers 

摘      要:The cyber-criminal compromises end-hosts(bots)to configure a network of bots(botnet).The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer(P2P)*** P2P botnets leverage the privileges of the decentralized nature of P2P ***,the P2P botnets exploit the resilience of this architecture to be arduous against take-down *** P2P botnets are smarter to be stealthy in their Commandand-Control mechanisms(C2)and elude the standard discovery ***,the other side of this cyberwar is the *** P2P botnet monitoring is an exacting mission because the monitoring must care about many aspects *** aspects pertain to the existing monitoring approaches,some pertain to the nature of P2P networks,and some to counter the botnets,i.e.,the anti-monitoring *** these challenges should be considered in P2P botnet *** begin with,this paper provides an anatomy of P2P ***,this paper exhaustively reviews the existing monitoring approaches of P2P botnets and thoroughly discusses each to reveal its advantages and *** addition,this paper groups the monitoring approaches into three groups:passive,active,and hybrid monitoring ***,this paper also discusses the functional and non-functional requirements of advanced *** conclusion,this paper ends by epitomizing the challenges of various aspects and gives future avenues for better monitoring of P2P botnets.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分