Botnet Modeling and Defense

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (15 February 2014) | Viewed by 276

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843-3112, USA
Interests: network security; system security; malware defense; web and social networking security; cloud and software-defined networking security; smartphone security; intrusion detection

E-Mail Website
Co-Guest Editor
Computer Science Department, University of Georgia, Athens, GA 30602-7404, USA
Interests: computer and network security; machine learning/data mining techniques for efficient mining and modeling of very large datasets of network and system information; Malware/Botnet modeling and detection at the network level

E-Mail Website
Co-Guest Editor
Carnegie Mellon University – CERT, Pittsburgh, PA 15213-2612, USA
Interests: network security; mobile device security; suspicious assessment; malware distribution networks

E-Mail Website
Co-Guest Editor
Institute of Network Science and Cyberspace, Tsinghua University, Haidian District, Beijing 100083, China
Interests: system security; network security; capture the flag competition

Special Issue Information

Dear Colleagues,

In the center of current cyber attacks and criminal activities are the so called botnets, i.e., networks of (up to millions of) infected machines (a.k.a. bots) that are under the control of cyber criminals (a.k.a. botmasters). It is recognized that botnets are the current largest threat to Internet security. This special issue of Future Internet is intended to foster the dissemination of high quality research in all aspects regarding botnet modeling, analysis, detection and defense. We solicit papers in a variety of topics including, but not limited to:

  • honeypot and honeynet design, operation, and data collection
  • traffic monitoring, analysis, and detection
  • botnet behavior, protocol and architecture modeling and analysis
  • malware/botnet prevention, detection, and containment
  • phishing, spam, DDoS, targeted attacks, etc.
  • reverse engineering and automated analysis
  • cyber crime and underground economy
  • new platforms: clouds, mobile/cellular networks, mobile devices/smartphones/TV, social networks, software-defined networks, etc.
  • legal issues and countermeasures

Dr. Guofei Gu
Dr. Roberto Perdisci
Dr. Jose Andre Morales
Dr. Jianwei Zhuge
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • botnet
  • malware
  • cyber crime
  • honeypot/honeynet

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop