**Author details**

Ji Yimu1,2,3,4,5 and Liu Shangdong1,3,4\*

1 School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China

2 Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, Jiangsu, China

3 Institute of High-Performance Computing and Bigdata, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China

4 Nanjing Center of HPC China, Nanjing, Jiangsu, China

5 Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing, Jiangsu, China

\*Address all correspondence to: lsd@njupt.edu.cn

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**37**

*Threats from Botnets*

[1] China Internet Network Information Center. The 43rd Statistical Report on Internet

DOI: 10.1109/MC.2017.201

WiCOM.2012.6478491

[4] Song YZ. P2P Botnet detection based on permutation entropy and multi-sensor data fusion on decision level. Computer Science. 2016;**43**: 141-146. DOI: 10.1145/2379616.2379622

[5] Jianen Y, Zhaoxin Z, Haiyan XU, et al. Detection of IRC Botnet C&C channels using the instruction syntax. Journal of Tsinghua University. 2017;**57**(9):914-920. DOI: 10.16511/j. cnki. cnki.qhdxxb.2017.26.040

[6] Jang DI, Kim M, Jung HC, et al. Analysis of HTTP2P Botnet: Case study waledac. In: IEEE Malaysia International Conference on

Communications. 2010. DOI: 10.1109/

[7] Dibenedetto S, Gadkari K, Diel N, et al. Fingerprinting custom Botnet protocol stacks. In: IEEE Secure Network Protocols. 2010. DOI: 10.1109/

MICC.2009.5431541

NPSEC.2010.5634448

[8] Yu-Peng T, Zhang YZ,

issn.0372-2112.2018.04.004

Yin T. Modeling and evaluating a cross-realm architecture for P2P Botnet. Acta Electronica Sinica. 2018;**46**(4):791-796. DOI: 10.3969/j.

**References**

*DOI: http://dx.doi.org/10.5772/intechopen.88927*

[9] Wu Z, Zhou H, Yu Z. A novel hierarchical Botnet model. In: IEEE Conference Anthology. China. 2014. DOI: 10.1109/ ANTHOLOGY.2013.6784723

CRISIS.2010.5764915

DOI: 10.1109/SP.2012.49

COMST.2014.2350994

44599-1\_8

[13] Mazurczyk W, Caviglione L. Steganography in modern smartphones and mitigation techniques. IEEE Communication Surveys and Tutorials. 2015;**17**(1):334-357. DOI: 10.1109/

[14] Barford P, Yegneswaran V. An Inside Look at Botnets. Advances in Information Security. 2007;**33**(4): 171-191. DOI: 10.1007/978-0-387-

[15] Li Z, Chen X. Misusing Kademlia protocol to perform DDoS attacks. In: IEEE International Symposium on Parallel & Distributed Processing with Applications. Sydney, NSW, Australia. 2008. DOI: 10.1109/ISPA.2008.15

[16] Singh K, Guntuku SC, Thakur A, et al. Big data analytics framework for peer-to-peer Botnet detection using random forests. Information Sciences.

[10] Sinha P, Boukhtouta A, Belarde VH, et al. Insights from the analysis of the mariposa Botnet. In: International Conference on Risks & Security of Internet & Systems. Montreal, QC, Canada. 2010. DOI: 10.1109/

[11] Wang T, Yu SZ. Centralized Botnet detection by traffic aggregation. In: IEEE International Symposium on Parallel & Distributed Processing with Applications. Chengdu, Sichuan, China. IEEE; 2009. DOI: 10.1109/ISPA.2009.74

[12] Bonneau J. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. Security & Privacy. San Francisco, CA, USA. IEEE; 2012.

Development in China. 2019;**2**:19-20. DOI: 10.13666/j.cnki.jnlc.2019.02.001

[2] Kolias C, Kambourakis G, Stavrou A, et al. DDoS in the IoT: Mirai and other Botnets. Computer. 2017;**50**(7):80-84.

[3] Cai T, Zou F. Detecting HTTP Botnet with clustering network traffic. In: International Conference on Wireless Communications, Networking and Mobile Computing. Shanghai. IEEE. 2012. pp. 1-7. DOI: 10.1109/
