ABSTRACT

Botnets are emerging as “the biggest threat facing the internet today” [Ferguson, 2008] because of their enormous volume and sheer power. Botnets containing thousands of bots (compromised hosts) have been tracked by several di¡erent researchers [Freiling et al., 2005], [Rajab et al., 2006]. Bots in these botnets are controlled from a Command and Control (C&C) center, operated by a human botmaster or botherder. e botmaster can instruct these bots to recruit new bots, launch coordinated DDoS attacks against speci’c hosts, steal sensitive information from infected machines, send mass spam emails, and so on.