Understanding the Botnet Phenomenon

  • Dr. Priyanka Surendran
Keywords: Bots, Botnet, C&C, Botmaster


Internet threats have increased manifold with the arrival of botnets. Many organizations worldwide and the social networks have been affected by botnets. Numerous researches have been carried to understand the concept of bots, C&C channels, botnet and botmasters. These botnets have been able to update itself regularly which makes them very difficult to be detected. The purpose of this paper is to understand the  of behavior of botnets and its affect on the virtual world. The paper has also analyzed the types of botnets, lifecycle and elements of botnets.


Download data is not yet available.


E. Cooke, F. Jahanian, & D. McPherson. (2005). The zombie roundup: understanding, detecting, and disrupting botnets. In: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop, USENIX Association, Berkeley, CA, USA, 39-44.

K. Birman, M. Hayden, O. Ozkasap, Z. Xiao, M. Budiu, & Y. Minsky. (1999). Bimodal multicast. ACM Transactions on Computer Systems, 17(2), 41–88.

P. Eugster, R. Guerraoui, S. Handurukande, P. Kouznetsov, & A. Kermarrec. (2003). Lightweight probabilistic broadcast. ACM Transactions on Computer Systems, 21(4), 341–374.

J. Oikarinen & D. Reed. (1993). Internet relay chat protocol. Available at: https://www.rfceditor.org/rfc/pdfrfc/rfc1459.txt.pdf.

Eggdrop: Open Source IRC Bot. (1993). Available at: http://www.eggheads.org/.

M. Feily, A. Shahrestani, & S. Ramadass. (2009). A survey of botnet and botnet detection. In: Emerging Security Information, Systems and Technologies, 268–273.

M. Bailey, E. Cooke, F. Jahanian, Y. Xu, & M. Karir. (2009). A survey of botnet technology and defenses. In: Conference for Homeland Security, 299– 304.

SSC Silva, RMP Silva, RCG Pinto, RM Salles. (2013). Botnets: A survey. Computer Networks, 57(2013), 378–403.

M. Rajab, J. Zarfoss, F. Monrose, & A. Terzis. (2006). A multifaceted approach to understanding the botnet phenomenon. Available at: http://www.cs.jhu.edu/~fabian/papers/botnets.pdf.

Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P.Roberts, & K. Han. (2008). Botnet research survey. In: Proc. 32nd Annual IEEE International Conference on Computer Software and Applications, 967- 972.

K. K. R. Choo. (2007). Zombies and Botnets. Trends and issues in crime and criminal justice, no. 333. Available at: https://aic.gov.au/publications/tandi/tandi333.

L. Song, Z. Jin, & G. Sun. (2011). Modeling and analyzing of botnet interactions. In Proc. of Physica A, 390(2), 347–358.

D. Dagon, G. Gu , C.P. Lee, & W. Lee. (2007). A taxonomy of botnet structures. In Proc. 23rd Annual Computer Security Applications Conference, 325-339.

H. Choi, H. Lee, H. Lee, & H. Kim. (2007). Botnet detection by monitoring group activities in DNS traffic. In: Proc. 7th IEEE International Conference on Computer and Information Technology, 715-720.

P. Vixie, S. Thomson, Y. Rekhter, & J. Bound. (1997). Dynamic updates in the domain name system(DNS UPDATE). Available at: http://www.faqs.org/rfcs/rfc2136.html.

D. Dagon, G. Gu , C.P. Lee, & W. Lee. (2007). A taxonomy of botnet structures. In Proc: 23rd Annual Computer Security Applications Conference, 325-339.

R.Villamarin-Salomon & J.C. Brustoloni. (2008). Identifying botnets using anomaly detection techniques applied to DNS traffic. In Proc: 5th IEEE Consumer Communications and Networking Conference, 476-481.

A. Karim, R. B. Salleh, M. Shiraz, S. A. A. Shah, I. Awan, & N. B. Anuar. (2014). Botnet detection techniques: review, future trends, and issues. Journal of Zhejiang University SCIENCE C, 15(11), 943–983.

F. Tegeler, X. Fu, G. Vigna, & C. Kruegel. (2012). Botfinder: Finding bots in network traffic without deep packet inspection. In Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, 349–360.

How to Cite
Dr. Priyanka Surendran. (2018). Understanding the Botnet Phenomenon. International Journal of Engineering and Management Research, 8(4), 193-195. Retrieved from https://www.ijemr.net/ojs/index.php/ojs/article/view/279