2018
DOI: 10.1016/j.comnet.2018.08.014
|View full text |Cite
|
Sign up to set email alerts
|

BotCluster: A session-based P2P botnet clustering system on NetFlow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(13 citation statements)
references
References 10 publications
0
12
0
1
Order By: Relevance
“…Network traffic has a network header. Let Netflow traffic be set as group records, and Netflow traffic be denoted as FT in the model as : (2) where rk was a collection of suspected bot activities records, K was an index of records activity with natural numbers. Each record (rk) has a network header (∂ ) and was defined as (3) where SIP ={sIPm}m=1,…,n was a set collection of source IP addresses, DIP ={dIPm}m=1,…,n was a set collection of destination IP address, Sport ={sportm}m=1,…,n was a set collection of source port address, Dport ={dportm}m=1,…,n was a set collection of destination port address, P ={pm}m=1,…,n was a set collection of protocol and Tpkts ={tpktsm}m=1,…,n was a set collection of total packets.…”
Section: Definition and Notation Of B-corr Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Network traffic has a network header. Let Netflow traffic be set as group records, and Netflow traffic be denoted as FT in the model as : (2) where rk was a collection of suspected bot activities records, K was an index of records activity with natural numbers. Each record (rk) has a network header (∂ ) and was defined as (3) where SIP ={sIPm}m=1,…,n was a set collection of source IP addresses, DIP ={dIPm}m=1,…,n was a set collection of destination IP address, Sport ={sportm}m=1,…,n was a set collection of source port address, Dport ={dportm}m=1,…,n was a set collection of destination port address, P ={pm}m=1,…,n was a set collection of protocol and Tpkts ={tpktsm}m=1,…,n was a set collection of total packets.…”
Section: Definition and Notation Of B-corr Modelmentioning
confidence: 99%
“…Bot activities have a characteristic that differed from other malware characteristics. Botnet consists of a collection of infected computers called as bots and controlled by botmaster [2]. Bot would then attack a 'victim' computer based on the bot master's command transmitted to all bot clients.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Deste modo, qualquer botnet que não utilize a arquitetura C&C tende a não ser identificada. O trabalho de Wang et al (2018) utiliza uma abordagem similar, onde o objetivoé agrupar as sessões P2P dos dispositivos infectados. Diferentemente, para o sistema ANTE, a arquitetura da botnet nãó e um pré-requisito para que a antecipação seja feita com sucesso, ou seja, nosso sistema independe do tipo do ataque.…”
Section: Trabalhos Relacionadosunclassified
“…removing approved DNS addresses via white-listing based on Alexa [17,39] or other rule based exclusion criteria (e.g. [5,36,46]). It is unclear whether the obtained results are due to the analysis or filtering steps.…”
Section: Related Workmentioning
confidence: 99%