Botnets: Architectures, Countermeasures, and Challenges, 1st Edition (Hardback) book cover

Botnets

Architectures, Countermeasures, and Challenges, 1st Edition

Edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou

CRC Press

408 pages

Purchasing Options:$ = USD
Hardback: 9780367191542
pub: 2019-10-03
SAVE ~$25.99
Available for pre-order
$129.95
$103.96
x


FREE Standard Shipping!

Description

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Table of Contents

Part 1. Botnet Modeling, Topologies, and Architectures: 1. Centralized, Decentralized, and Hybrid Botnet Architectures. 2. Peerto-Peer (P2P) Botnets. Mobile Botnets. 3. IoT-based Botnets. 4. Cloud-based Botnets. 5. Social Network Botnets. Part 2. Economics of Botnets: 6. Cybercrime and Underground Economy. 7. Optimization of Botnet Size. 8. Strategies to Reduce the Profitability of Criminal Botnets. 9. Methods to Calculate the Territorial Sizes for Online Criminal Networks. 10. Botnet-as-a-Service, Booters, and Stressers. Part 3. Advanced Covert Command and Control (C&C) Channels: 11. Botnet Behavior and Protocol Modeling and Analysis. 12. Fast-fluxing. Domain Generation Algorithms. Part 4. State-of-the-Art in Detection and Mitigation of Botnets: 13. Botnet-powered DDoS Attacks. 14. Botnet Infiltration. 15. Botnet Shutdown Operation. DGA-based Domain Name Sinkholing: 16. Traffic Monitoring and Big Data Analysis of Botnet Coordination. 17. Graph Representation and Analysis of Botnets.

18. SDN-based Botnet Detection and Blocking. 19. Cryptocurrency Mining Botnets. 20. Legal Issues.

About the Editors

Georgios Kambourakis received the Diploma in Applied Informatics from the Athens University of Economics and Business and the Ph.D. in Information and Communication Systems Engineering from the dept. of Information and Communications Systems Engineering of the University of the Aegean. He also holds a Master of Education degree from the Hellenic Open University. Currently, Dr. Kambourakis is an Associate Professor at the dept. of Information and Communication Systems Engineering, University of the Aegean, Greece, and the director of Info-Sec-Lab. His research interests are in the fields of mobile and wireless networks security and privacy, VoIP security, IoT security and privacy, DNS security, and security education, and he has more than 120 refereed publications in the above areas. He has guest edited special issues of several journals, including ACM/Springer Mobile Networks and Applications, Computer Standards & Interfaces, IEEE Computer, Information Sciences, Computer Communications, Security and Communication Networks, Wireless Communications and Mobile Computing, Symmetry. He has been involved in several national and EU funded R&D projects in the areas of Information and Communication Systems Security. He is a reviewer for a plethora of IEEE and other international journals and has served as a technical program committee member for more than 220 international conferences in security and networking. More info at www.icsd.aegean.gr/gkamb.

Marios Anagnostopoulos holds a BSc in Computer Science from Computer Science Department of University of Crete. He received the MSc degree in Information and Communication Systems Security in 2010 from the University of the Aegean. He also holds a Ph.D. in Information and Communication Systems Engineering from the Dept. of Information and Communication Systems Engineering, University of the Aegean, Greece in 2016 under the supervision of Prof. Georgios Kambourakis. The title of Ph.D. thesis was "DNS as a multipurpose attack vector". Currently, he is Post-Doctoral Research Fellow at the Singapore University of Technology and Design (SUTD) under the supervision of Prof. David Yau. His research interests are in the fields of DNS security, Botnets, Denial of Services attacks, Network Security and Network Services and Applications.

Weizhi Meng is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Denmark. He obtained his Ph.D. degree in Computer Science from the City University of Hong Kong (CityU), Hong Kong in 2013. He was known as Yuxin Meng and prior to joining DTU, he worked as a research scientist in Infocomm Security (ICS) Department, Institute for Infocomm Research, Singapore, and as a senior research associate in CityU. He won the Outstanding Academic Performance Award during his doctoral study, and is a recipient of The HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014 and 2017. His primary research interests are cyber security and intelligent technology in security including intrusion detection, mobile security and authentication, HCI security, cloud security, trust computation, web security, malware and vulnerability analysis. He also shows a strong interest in applied cryptography. He has been leading guest editor for a special issue in Future Generation Computer Systems.

Peng Zhou received the PhD degree from the Hong Kong Polytechnic University in 2014 and joined Singapore Nanyang Technological University as research fellow in 2015. He is currently a lecturer at Shanghai University. He has published numerous papers in prestigious journals and conferences covering the topics of network security and trust management, including IEEE TIFS, IEEE TDSC, NDSS, DSN and ACSAC. He was awarded as a young eastern scholar by Shanghai government in 2016.

About the Series

Series in Security, Privacy and Trust

Learn more…

Subject Categories

BISAC Subject Codes/Headings:
COM032000
COMPUTERS / Information Technology
COM043000
COMPUTERS / Networking / General
COM053000
COMPUTERS / Security / General