E-mail

E-mail a Wiley Online Library Link

Cui Xiang, Yin Lihua, Jin Shuyuan, Hao Zhiyu and Li Shuhao Botnet spoofing: fighting botnet with itself Security and Communication Networks 8

Version of Record online: 19 FEB 2013 | DOI: 10.1002/sec.749

Thumbnail image of graphical abstract

Botnet spoofing exploits the essential property of a persistent bot that it must obtain its file path before subsequent auto-start registration or self-propagation to spoof a specific bot and trick the specific bot to propagate BotSpoofer instead of propagating itself, consequently making the victim not only avoid an originally successful attack but also achieve extra protection provided by BotSpoofer. Thus, botnet spoofing is independent of the vulnerability, protocol, and structure of botnet C&C.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH