27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Evan Dembskey and Elmarie Biermann<br />

In summary, we propose to model and implement a proof-of-concept of an integrated SA botnet<br />

defense system. Some challenges of developing such a system are its complexity and human privacy<br />

requirements and laws. Rather than be daunted by this, we instead believe that the effort will be well<br />

rewarded and will identify future areas of research.<br />

IDS Level<br />

Observer Level<br />

Figure 2: Observer and IDS layers<br />

References<br />

Infiltrate and Disable<br />

Spawn Intelligent Software Agent Network<br />

Classification<br />

Collective Behavior<br />

Communication Analysis<br />

Resource Gathering<br />

Spreading & Growth Patterns<br />

Network Traffic Analysis<br />

Bailey, M., Cooke, E., Jahanian, F., Xu, Y. & Karir, M. 2009, "A survey of botnet technology and defenses",<br />

Proceedings of the 2009 Cybersecurity Applications & Technology <strong>Conference</strong> for Homeland Security-<br />

Volume 00, IEEE Computer Society, pp. 299.<br />

Bigus, J.P. & Bigus, J. 2001, Constructing intelligent agents using Java, Wiley New York.<br />

Carr, J. & Shepherd, L. 2010, Inside cyber warfare, 1st edn, O'Reilly Media, Inc., Sebastopol, Calif.<br />

304

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!