2020
DOI: 10.3837/tiis.2020.10.014
|View full text |Cite
|
Sign up to set email alerts
|

B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis

Abstract: Botnet is a type of dangerous malware. Botnet attack with a collection of bots attacking a similar target and activity pattern is called bot group activities. The detection of bot group activities using intrusion detection models can only detect single bot activities but cannot detect bots' behavioral relation on bot group attack. Detection of bot group activities could help network administrators isolate an activity or access a bot group attacks and determine the relations between bots that can measure the co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Graph visualization-based analysis techniques are often implemented in botnet attack analysis techniques [15,22], attack event analysis [23], or event forensics [24]. In [15,22], simple visualization can be done by identifying the direction of the attacker's communication in graph-directed interaction (GDI), representing the attack as a node and communication as an edge. Rabzelj et al [23] conducted an attack analysis with data distribution originating from an intrusion detection system known as a honeypot.…”
Section: Related Workmentioning
confidence: 99%
“…Graph visualization-based analysis techniques are often implemented in botnet attack analysis techniques [15,22], attack event analysis [23], or event forensics [24]. In [15,22], simple visualization can be done by identifying the direction of the attacker's communication in graph-directed interaction (GDI), representing the attack as a node and communication as an edge. Rabzelj et al [23] conducted an attack analysis with data distribution originating from an intrusion detection system known as a honeypot.…”
Section: Related Workmentioning
confidence: 99%
“…The intended relationship was the similarity between the two attacker activities. If two different attackers are represented as nodes A and B, there may be a difference in similarity between A to B and B to A [24]. To determine whether two attacking objects are similar and have a substantial similarity value, it is necessary to analyze the similarity threshold value [25].…”
Section: Dynamic Threshold Analysismentioning
confidence: 99%