Proceedings of the 2009 ACM Symposium on Applied Computing 2009
DOI: 10.1145/1529282.1529734
|View full text |Cite
|
Sign up to set email alerts
|

Bayesian bot detection based on DNS traffic similarity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
22
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(23 citation statements)
references
References 4 publications
0
22
0
1
Order By: Relevance
“…However these papers use the DNS traffic behavior and not the mapping information used by Notos and in our work. Villarmin et al [13] provide C&C detection technique motivated by the fact that bots typically initiate contact with C&C servers to poll for instructions. As an example, for each domain, they aggregate the number of non-existent domains (NXDOMAIN) responses per hour and use it as one of the classification features.…”
Section: Background and Related Workmentioning
confidence: 99%
“…However these papers use the DNS traffic behavior and not the mapping information used by Notos and in our work. Villarmin et al [13] provide C&C detection technique motivated by the fact that bots typically initiate contact with C&C servers to poll for instructions. As an example, for each domain, they aggregate the number of non-existent domains (NXDOMAIN) responses per hour and use it as one of the classification features.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In traditional, non-DTN, networks, Kolbitsch et al [8] and Bayer et al [9] proposed to detect malware with learned behavioral model, in terms of system call and program flow. We extend the Naive Bayesian model, which has been applied in filtering email spams [13], [14], [15], detecting botnets [16], and designing IDSs [10], [17], and address DTN-specific, malware-related, problems. In the context of detecting slowly propagating Internet worm, Dash et al presented a distributed IDS architecture of local/global detector that resembles the neighborhood-watch model, with the assumption of attested/honest evidence, i.e., without liars [10].…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we present a simple, yet effective solution, look ahead, which naturally reflects individual nodes' intrinsic risk inclinations against malware infection, to balance between these two extremes. Essentially, we extend the naive Bayesian model, which has been applied in filtering email spams [13], [14], [15], detecting botnets [16], and designing IDSs [10], [17], and address two DTNspecific, malware-related, problems:…”
Section: Introductionmentioning
confidence: 99%
“…The investigations, devoted to botnet counteraction methods, may be conditionally divided into two logical groups: methods, which are based on identification of predefined signatures [28], and methods which rely on detection of local and network anomalies [3,10,18,32]. The second group of methods has a significant advantage against first group in ability to detect unknown threats not having specific knowledge of their implementation [15].…”
Section: Related Workmentioning
confidence: 99%