From 516fca8dbc92c87b582c9bbb5b542e14308d26e4 Mon Sep 17 00:00:00 2001 From: vbrandl Date: Thu, 17 Mar 2022 20:54:07 +0100 Subject: [PATCH] Cite --- content.tex | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content.tex b/content.tex index 6ff54fc1..eaa107af 100644 --- a/content.tex +++ b/content.tex @@ -54,7 +54,7 @@ In a \ac{p2p} botnet, each node in the network knows a number of its neighbors a This lack of a \ac{spof} makes \ac{p2p} botnets more resilient to take-down attempts since the communication is not stopped and botmasters can easily rejoin the network and send commands. -The constantly growing damage produced by botnets has many researchers and law enforcement agencies trying to shut down these operations~\cite{bib:nadji_beheading_2013}\cite{bib:nadji_still_2017}\cite{bib:dittrich_takeover_2012}. +The constantly growing damage produced by botnets has many researchers and law enforcement agencies trying to shut down these operations~\cite{bib:nadji_beheading_2013, bib:nadji_still_2017, bib:dittrich_takeover_2012}. The monetary value of these botnets directly correlates with the amount of effort, botmasters are willing to put into implementing defense mechanisms against take-down attempts. Some of these countermeasures include deterrence, which limits the number of allowed bots per IP address or subnet to 1; blacklisting, where known crawlers and sensors are blocked from communicating with other bots in the network (mostly IP based); disinformation, when fake bots are placed in the neighborhood lists, which invalidates the data collected by crawlers; and active retaliation like \ac{ddos} attacks against sensors or crawlers~\cite{bib:andriesse_reliable_2015}. \todo{source for constantly growing, position in text} @@ -577,4 +577,4 @@ In the end, I would like to thank %}}} acknowledgments -% vim: set filetype=tex ts=2 sw=2 tw=0 et foldmethod=marker spell : +% vim: set filetype=tex ts=2 sw=2 tw=0 et foldmethod=marker spell : \ No newline at end of file