A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing

2020 ◽  
Vol 10 (3) ◽  
pp. 17-53
Author(s):  
Ahmad Al-Nawasrah ◽  
Ammar Ali Almomani ◽  
Samer Atawneh ◽  
Mohammad Alauthman

A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.

2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


Author(s):  
Antonio Miguel Rosado da Cruz ◽  
Sara Paiva

Mobile computing and Cloud computing are two of the most growing technologies in number of users, practitioners and research projects. This chapter surveys mobile technologies and applications, along with cloud computing technologies and applications, presenting their evolution and characteristics. Then, building on mobile devices limitations and mobile apps increasing need of resources, and on the cloud computing ability to overcome those limitations, the chapter presents mobile cloud computing, and characterizes it by addressing approaches to augment mobile devices capabilities. The chapter is settled after some views about future research directions and some concluding remarks.


Author(s):  
Md Mahbubur Rahim ◽  
Maryam Jabberzadeh ◽  
Nergiz Ilhan

E-procurement systems that have been in place for over a decade have begun incorporating digital tools like big data, cloud computing, internet of things, and data mining. Hence, there exists a rich literature on earlier e-procurement systems and advanced digitally-enabled e-procurement systems. Existing literature on these systems addresses many research issues (e.g., adoption) associated with e-procurement. However, one critical issue that has so far received no rigorous attention is about “unit of analysis,” a methodological concern of importance, for e-procurement research context. Hence, the aim of this chapter is twofold: 1) to discuss how the notion of “unit of analysis” has been conceptualised in the e-procurement literature and 2) to discuss how its use has been justified by e-procurement scholars to address the research issues under investigation. Finally, the chapter provides several interesting findings and outlines future research directions.


Challenges ◽  
2019 ◽  
Vol 10 (1) ◽  
pp. 1 ◽  
Author(s):  
Willis Gwenzi ◽  
Edmond Sanganyado

Recurrent cholera outbreaks in sub-Saharan Africa (SSA) attracted a lot of research interest, raising questions about the effectiveness of current prevention and control methods. However, research on cholera and other water-borne diseases in Africa is dominated by epidemiological studies, while investigations on the environmental drivers and reservoirs of cholera remain scarce. The current discourse relating cholera to the environment in SSA is often limited to the rudimentary statement that, “cholera is caused by the consumption of contaminated water and food”. Yet, beyond this simplistic view, literature elsewhere shows that cholera outbreaks are controlled by its complex interactions with environmental drivers and reservoirs. This brings to question whether cholera can be eradicated in SSA without understanding these complex interactions. The current review seeks to (1) highlight the nature and dynamics of recent cholera outbreaks in SSA, (2) discuss the importance of environmental reservoirs of Vibrio cholerae, and anthropogenic and hydroclimatic drivers in controlling the dynamics of cholera outbreaks, and (3) highlight key knowledge gaps and future research directions, and the need to harness emerging research tools such as modeling, machine learning, data mining, and genomics techniques to better understand the cholera dynamics. By bringing to fore these often-overlooked issues in cholera research, we seek to stimulate discussion, and promote a shift toward cross-disciplinary research on cholera and other water-borne diseases in SSA and beyond.


Electronics ◽  
2018 ◽  
Vol 7 (11) ◽  
pp. 309 ◽  
Author(s):  
Hind Bangui ◽  
Said Rakrak ◽  
Said Raghay ◽  
Barbora Buhnova

Cloud computing has significantly enhanced the growth of the Internet of Things (IoT) by ensuring and supporting the Quality of Service (QoS) of IoT applications. However, cloud services are still far from IoT devices. Notably, the transmission of IoT data experiences network issues, such as high latency. In this case, the cloud platforms cannot satisfy the IoT applications that require real-time response. Yet, the location of cloud services is one of the challenges encountered in the evolution of the IoT paradigm. Recently, edge cloud computing has been proposed to bring cloud services closer to the IoT end-users, becoming a promising paradigm whose pitfalls and challenges are not yet well understood. This paper aims at presenting the leading-edge computing concerning the movement of services from centralized cloud platforms to decentralized platforms, and examines the issues and challenges introduced by these highly distributed environments, to support engineers and researchers who might benefit from this transition.


2019 ◽  
Vol 20 (2) ◽  
pp. 377-398 ◽  
Author(s):  
Avinash Kaur ◽  
Pooja Gupta ◽  
Manpreet Singh ◽  
Anand Nayyar

In cloud computing, data placement is a critical operation performed as part of workflow management and aims to find the best physical machine to place the data. It has direct impact on performance, cost and execution time of workflows. Number of data placement algorithms is designed in cloud computing environment that aimed to improve various factors affecting the workflows and their execution including the movement of data among data centers. This paper provides a complete survey and analyses of existing data placement schemes proposed in literature for cloud computing. Further, it classifies data placement schemes based on their assess capabilities and objectives. Further objectives and properties of data placement schemes are compared. Finally future research directions are provided with concluding remarks.


Information ◽  
2019 ◽  
Vol 10 (11) ◽  
pp. 337 ◽  
Author(s):  
Emmanuel C. Ogu ◽  
Olusegun A. Ojesanmi ◽  
Oludele Awodele ◽  
‘Shade Kuyoro

Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt to seek a deeper and robust understanding of the nature of the threat for more effective solutions, it becomes necessary to again traverse the threat landscape, and consolidate what is known so far about botnets, that future research directions could be more easily visualised. This research uses the general exploratory approach of the qualitative methodology to survey the current botnet threat landscape: Covering the typology of botnets and their owners, the structure and lifecycle of botnets, botnet attack modes and control architectures, existing countermeasure solutions and limitations, as well as the prospects of a botnet threat. The product is a consolidation of knowledge pertaining the nature of the botnet threat; which also informs future research directions into aspects of the threat landscape where work still needs to be done.


Sign in / Sign up

Export Citation Format

Share Document