scispace - formally typeset
P

Ping Wang

Researcher at University of Central Florida

Publications -  10
Citations -  873

Ping Wang is an academic researcher from University of Central Florida. The author has contributed to research in topics: Botnet & Vehicular ad hoc network. The author has an hindex of 9, co-authored 10 publications receiving 835 citations. Previous affiliations of Ping Wang include Symantec.

Papers
More filters
Proceedings Article

An advanced hybrid peer-to-peer botnet

TL;DR: In this paper, an advanced hybrid peer-to-peer botnet is proposed, which provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster.
Journal ArticleDOI

An Advanced Hybrid Peer-to-Peer Botnet

TL;DR: This paper presents the design of an advanced hybrid peer-to-peer botnet, which provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster.
Journal ArticleDOI

Honeypot detection in advanced botnet attacks

TL;DR: This paper presents a hardware and software independent honeypot detection methodology based on the following assumption: security professionals deploying honeypots have a liability constraint such that they cannot allow their honeypots to participate in real attacks that could cause damage to others, while attackers do not need to follow this constraint.
Proceedings ArticleDOI

A Systematic Study on Peer-to-Peer Botnets

TL;DR: This paper systematically study P2P botnets along multiple dimensions: bot candidate selection, network construction, C&C mechanisms and communication protocols, and mitigation approaches, and carefully study two defense approaches: index poisoning and sybil attack.
Book ChapterDOI

Peer-to-Peer Botnets

TL;DR: This chapter systematically study P2P botnets along multiple dimensions: botnet construction, C&C mechanisms, performance measurements, and mitigation approaches.