Abstract
Cybercriminals deploy botnets for conducting nefarious operations on the Internet. Botnets are managed on a large scale and harness the power of compromised machines, which are controlled through centralized portals known as C&C panels. C&C panels are considered as attackers' primary operating environment through which bots are controlled and updated at regular intervals of time. C&C panels also store information stolen from the compromised machines as a part of the data exfiltration activity. In this empirical study, we analyzed many over 9000 C&C web URLs to better understand the deployment and the operational characteristics of HTTP-based botnets.
Original language | English |
---|---|
Article number | 7981519 |
Pages (from-to) | 22-28 |
Number of pages | 7 |
Journal | IEEE Communications Magazine |
Volume | 55 |
Issue number | 7 |
DOIs | |
State | Published - Jul 2017 |
Bibliographical note
Publisher Copyright:© 2017 IEEE.
ASJC Scopus subject areas
- Computer Science Applications
- Computer Networks and Communications
- Electrical and Electronic Engineering