Exploring Botnet Evolution via Multidimensional Models and Visualisation
dc.contributor.author | Dash, W | |
dc.contributor.author | Craven, Matthew | |
dc.contributor.editor | Livraga G | |
dc.contributor.editor | Mitchell CJ | |
dc.date.accessioned | 2017-09-16T11:19:54Z | |
dc.date.available | 2017-09-16T11:19:54Z | |
dc.date.issued | 2017-09-14 | |
dc.identifier.isbn | 9783319680620 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.issn | 1611-3349 | |
dc.identifier.uri | http://hdl.handle.net/10026.1/9938 | |
dc.description.abstract |
A botnet is a program designed to perform a specific task using multiple computers connected in a network. In this paper we will focus on botnets being used to distribute malicious programs. In the real world, botnets have been shown to exhibit more aggressive and sophisticated behaviour than traditional malware. Botnets are used to infect computer networks and hence their success depends on the properties of the networks. We observe the behaviour of mathematical models used to describe botnets when botnet parameters are varied to understand if such variation is beneficial to their spread. We also introduce novel models for depicting botnet behaviour using master equations. These models, unlike previous ones, address nodes of distinct categories in a network as a sequence of probability distributions rather than a value at each time interval. We also contribute visualisations for these models. This paper is a substantial expansion of unpublished work the first author performed while on a Nuffield student research placement, with the second author the project supervisor. | |
dc.format.extent | 72-88 | |
dc.language.iso | en | |
dc.publisher | Springer International Publishing | |
dc.subject | Botnet | |
dc.subject | Differential equation | |
dc.subject | Master equation | |
dc.subject | Visualisation | |
dc.subject | Complex systems security | |
dc.subject | Security in P2P (peer to peer) systems | |
dc.title | Exploring Botnet Evolution via Multidimensional Models and Visualisation | |
dc.type | conference | |
dc.type | Conference Proceeding | |
plymouth.author-url | https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000463256600005&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008 | |
plymouth.date-start | 2017-09-14 | |
plymouth.date-finish | 2017-09-15 | |
plymouth.volume | Lecture Notes in Computer Science 10547 | |
plymouth.publisher-url | https://doi.org/10.1007/978-3-319-68063-7 | |
plymouth.conference-name | STM 2017 | |
plymouth.publication-status | Published | |
plymouth.journal | 1611-3349 | |
dc.identifier.doi | 10.1007/978-3-319-68063-7_5 | |
plymouth.organisational-group | /Plymouth | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA/EXTENDED UoA 10 - Mathematical Sciences | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA/UoA10 Mathematical Sciences | |
plymouth.organisational-group | /Plymouth/Users by role | |
plymouth.organisational-group | /Plymouth/Users by role/Academics | |
dc.publisher.place | Oslo, Norway | |
dcterms.dateAccepted | 2017-08-02 | |
dc.identifier.eissn | 1611-3349 | |
dc.rights.embargoperiod | No embargo | |
rioxxterms.versionofrecord | 10.1007/978-3-319-68063-7_5 | |
rioxxterms.licenseref.uri | http://www.rioxx.net/licenses/all-rights-reserved | |
rioxxterms.licenseref.startdate | 2017-09-14 | |
rioxxterms.type | Conference Paper/Proceeding/Abstract |