2017
DOI: 10.1155/2017/4934082
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Conversation-Based Botnet Detection Method

Abstract: A botnet is one of the most grievous threats to network security since it can evolve into many attacks, such as Denial-of-Service (DoS), spam, and phishing. However, current detection methods are inefficient to identify unknown botnet. The high-speed network environment makes botnet detection more difficult. To solve these problems, we improve the progress of packet processing technologies such as New Application Programming Interface (NAPI) and zero copy and propose an efficient quasi-real-time intrusion dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(44 citation statements)
references
References 23 publications
0
43
0
1
Order By: Relevance
“…In contrast, the human generated traffic does not contain any similarity due to miscellaneous activities. To capture the statistical similarity of botnet traffic, many P2P botnet detection schemes 2,[25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40] proposed in which a group of statistical features is introduced as a P2P botnet footprint. These features are extracted from the botnet traffic and context network traffic.…”
Section: Statistical Characteristicsmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, the human generated traffic does not contain any similarity due to miscellaneous activities. To capture the statistical similarity of botnet traffic, many P2P botnet detection schemes 2,[25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40] proposed in which a group of statistical features is introduced as a P2P botnet footprint. These features are extracted from the botnet traffic and context network traffic.…”
Section: Statistical Characteristicsmentioning
confidence: 99%
“…[25][26][27][28][29][30][31][32][33][34] In some proposals, the notion of conversation is defined by a 2-tuple (source IP and destination IP), and some features are introduced to characterize the conversations produced by bots. 35,36 The host-based footprints are extracted from the network traffic of each host (like the number of IP addresses it connected to). 2,[37][38][39][40] The proposed footprints related to each class are detailed in following subsections.…”
Section: Statistical Characteristicsmentioning
confidence: 99%
“…Firstly, the hardcoded IP address can be identified by a security researcher reverse engineering the malware, allowing mitigating action to be taken that may involve blacklisting the IP address [16]. Secondly, if the C&C server goes down or the IP address is detected, the nefarious activity can be easily identified and blocked by a security administrator which means their compromised device will be out of the attacker's control [13], [47].…”
Section: Malware Command and Controlmentioning
confidence: 99%
“…Chen et al [13] suggest that the Peer-to-Peer (P2P) botnets infrastructure was one of the first architectural structures that criminals used for overcoming the limitations of the centralised C&C network approach. This is also known as a decentralised topology.…”
Section: Malware Command and Controlmentioning
confidence: 99%
“…But these relations are not explicit and there are links among sources, types of attacks, reports, and incidents of the same type of attacks. Finally, the value is precisely the actionable knowledge that we can get from the cyber database from analyzing the quality of the data, automatized process, prediction of incidents, or detecting intrusion in different networks (see [30][31][32]). …”
Section: A Case Studymentioning
confidence: 99%