350 rub
Journal Highly available systems №2 for 2011 г.
Article in number:
Simulation of botnets and defense mechanisms against them
Authors:
I.V. Kotenko, A.M. Konovalov, A.V. Shorov
Abstract:
The paper suggests an approach to simulation of various operation stages of botnets, and defense mechanisms against them. We consider the developed models of botnets and defense mechanisms, implemented simulation environment, and the experimental results
Pages: 107-111
References
  1. Gamer T., Scharf M. Realistic Simulation Environments for IP-based Networks // Proceedings of 1st International Workshop on OMNeT++, Marseille, France. 2008.
  2. Williamson M. Throttling Viruses: Restricting propagation to defeat malicious mobile code // Proceedings of ACSAC Security Conference, Las Vegas, Nevada. 2002. P. 61-68.
  3. Chen S., Tang Y. Slowing Down Internet Worms // Proceedings of 24th International Conference on Distributed Computing Systems (ICDCS '04), 2004. P. 82-84.
  4. Akiyama M., Kawamoto T., Shimamura M., Yokoyama T., Kadobayashi Y., Yamaguchi S. A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior // Proceedings of International Symposium on Applications and the Internet Workshops (SAINTW'07). 2007.
  5. Jin C., Wang H., Shin K. Hop-count filtering: an effective defense against spoofed DDoS traffic // Proceedings of the 10th ACM conference on Computer and communications security. ACM New York, USA. 2003. P. 30-41.
  6. Peng T., Leckie C., Ramamohanarao K. Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring // Lecture Notes in Computer Science. V. 3042/2004. 2004. P.771-782.
  7. Li J., Mirkovic J., Wang M., Reither P., Zhang L. Save: Source address validity enforcement protocol // Proceedings of IEEE INFOCOM. 2002. P. 1557-1566.
  8. Varga A. OMNeT++ // Modeling and Tools for Network Simulation. Wehrle K., Günes M., Gross J. (Eds.). Springer Verlag. 2010.