Given the nature of this tool it would be interesting
to improve the whole setup of the environment to ease
the user (developer or researcher) experience. This
can be accomplished with, for example, the favor of
addition of new functionalities in a framework-like
way and the possibility of personalize every setting in
the core tool.
REFERENCES
Abraham, S. and Chengalur-Smith, I. (2010). An overview
of social engineering malware: Trends, tactics, and
implications. Technology in Society, 32(3):183 – 196.
Anderson, D. P., Cobb, J., Korpela, E., Lebofsky, M., and
Werthimer, D. (2002). Seti@home: An experiment in
public-resource computing. Commun. ACM, 45(11):56–
61.
Barford, P. and Yegneswaran, V. (2007). An Inside Look at
Botnets, pages 171–191. Springer US, Boston, MA.
B
¨
acher, P., Holz, T., K
¨
otter, M., and Wicherski, G. (2005).
Know your enemy: Tracking botnets.
Bertino, E. and Islam, N. (2017). Botnets and internet of
things security. Computer, 50(2):76–79.
Choi, H., Lee, H., Lee, H., and Kim, H. (2007). Botnet
detection by monitoring group activities in dns traffic.
In 7th IEEE International Conference on Computer
and Information Technology (CIT 2007), pages 715–
720.
Cole, A., Mellor, M., and Noyes, D. (2007). Botnets: The
rise of the machines. In Proceedings on the 6th Annual
Security Conference, pages 1–14.
Cooke, E., Jahanian, F., and McPherson, D. (2005). The zom-
bie roundup: Understanding, detecting, and disrupting
botnets. SRUTI, 5:6–6.
Dittrich, D. and Dietrich, S. (2008). P2p as botnet command
and control: A deeper insight. In 2008 3rd Internatio-
nal Conference on Malicious and Unwanted Software
(MALWARE), pages 41–48.
DSLReports.com (2009). What is a botnet trojan?
Feily, M., Shahrestani, A., and Ramadass, S. (2009). A
survey of botnet and botnet detection. In 2009 Third
International Conference on Emerging Security Infor-
mation, Systems and Technologies, pages 268–273.
Foundation, P. S. (2015). Python programming language.
Grizzard, J. B., Sharma, V., Nunnery, C., Kang, B. B., and
Dagon, D. (2007). Peer-to-peer botnets: Overview and
case study. HotBots, 7:1–1.
Gu, G., Perdisci, R., Zhang, J., Lee, W., et al. (2008a). Botmi-
ner: Clustering analysis of network traffic for protocol-
and structure-independent botnet detection. In USENIX
Security Symposium, volume 5, pages 139–154.
Gu, G., Zhang, J., and Lee, W. (2008b). Botsniffer: De-
tecting botnet command and control channels in net-
work traffic.
Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D., and
Jones, L. (1928). Socks protocol version 5.
Li, C., Jiang, W., and Zou, X. (2009a). Botnet: Survey and
case study. In 2009 Fourth International Conference
on Innovative Computing, Information and Control
(ICICIC), pages 1184–1187.
Li, C., Jiang, W., and Zou, X. (2009b). Botnet: Survey and
case study. In innovative computing, information and
control (icicic), 2009 fourth international conference
on, pages 1184–1187. IEEE.
Mirkovic, J. and Reiher, P. (2004). A taxonomy of ddos at-
tack and ddos defense mechanisms. SIGCOMM Com-
put. Commun. Rev., 34(2):39–53.
Ollmann, G. (2009). Botnet communication topologies -
understanding the intricacies of botnet command-and-
control.
Rataj, M. (2014). Simulation of Botnet C&C Channels.
PhD thesis, Ph. D Dissertation, Faculty of Electrical
Engineering-Department of Computer Science and En-
gineering, Czech Technical University in Prague.
R.L. Rivest, A. S. and Adleman, L. (1978). A method for
obtaining digital signatures and public-key cryptosys-
tems.
Room, S. I. R. (2003). Bots & botnet: An overview.
Seenivasan, D. and Shanthi, K. (2014). Categories of botnet:
a survey. Int. J. Comput. Control Quantum Inf. Eng,
8(9):1589–1592.
Sharma, S., Garg, S., Karodiya, A., and Gupta, H. (2016).
Distributed denial of service attack. 4.
Tanwar, G. S. and Goar, V. (2014). Tools, techniques &
analysis of botnet. In Proceedings of the 2014 Interna-
tional Conference on Information and Communication
Technology for Competitive Strategies, ICTCS ’14, pa-
ges 92:1–92:5, New York, NY, USA. ACM.
Team, I.-H. D. (2015). Ircd-hybrid.
Wyke, J. (2012). The zeroaccess botnet: Mining and fraud
for massive financial gain. Sophos Technical Paper.
A Hands-on Approach on Botnets for Behavior Exploration
469