2019
DOI: 10.1109/access.2019.2919680
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative Framework for Early Detection of RAT-Bots Attacks

Abstract: Attackers tend to use Remote Access Trojans (RATs) to compromise and control a targeted computer, which makes the RAT detection as an active research field. This paper introduces a machine learning-based framework for detecting compromised hosts and networks that are infected by the RAT-Bots. The proposed framework consists of two agents that are integrated to achieve reliable early detection of the RAT-bots. The first agent, the host agent, is responsible for monitoring the system behavior of the running host… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Based on literature [14], there are three major methods of botnet detection such as host-based detection, honeynet detection and network-based detection. Recently, machine learning based detection has become the most widely used for detecting botnets methods as proven by previous literature [15], [16], [4], [5]. In addition, the number and complexity of IoT devices is also growing, it has become important to develop effective botnet detection methods.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on literature [14], there are three major methods of botnet detection such as host-based detection, honeynet detection and network-based detection. Recently, machine learning based detection has become the most widely used for detecting botnets methods as proven by previous literature [15], [16], [4], [5]. In addition, the number and complexity of IoT devices is also growing, it has become important to develop effective botnet detection methods.…”
Section: Related Workmentioning
confidence: 99%
“…However, this framework lacks emphasis on earlystage prevention. In contrast, the collaborative framework presented by [16] provides a comprehensive approach to botnet detection, incorporating a two-phase decision-making process involving the Host Agent Detector (HAD) and Network Agent Detector (NAD). HAD captures suspicious behavior using machine learning models, extracting features from network logs.…”
Section: A Botnet Detection Frameworkmentioning
confidence: 99%
“…That latter point is essential, especially regarding mobile malware investigations. A user may unknowingly grant permissions to a malicious app masquerading as a legitimate one, allowing it to secretly access the camera, microphone, keylogger, RAT command, send spam SMS messages, or use WiFi/Bluetooth for further propagation [28,29]. They know what app has permission(s) to help an examiner explain a device's potentially malicious behavior.…”
Section: Potential Threatmentioning
confidence: 99%
“…This system will trigger an alert for the presence of Zeus bot if the three conditions regarding specific folder, network traffic and API hooks are all satisfied. Ahmed A.awad et al [26] introduced a machine learning-based framework for detecting compromised hosts and networks that are infected by the RAT-Bots. This method relies heavily on the host agent because its network agent starts to run until it receives the alarm sent by the host agent.…”
Section: Related Workmentioning
confidence: 99%