2011 Ninth Annual International Conference on Privacy, Security and Trust 2011
DOI: 10.1109/pst.2011.5971980
|View full text |Cite
|
Sign up to set email alerts
|

Detecting P2P botnets through network behavior analysis and machine learning

Abstract: Botnets have become one of the major threats on the Internet for serving as a vector for carrying attacks against organizations and committing cybercrimes. They are used to generate spam, carry out DDOS attacks and click-fraud, and steal sensitive information. In this paper, we propose a new approach for characterizing and detecting botnets using network traffic behaviors. Our approach focuses on detecting the bots before they launch their attack. We focus in this paper on detecting P2P bots, which represent t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
145
0
8

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 217 publications
(153 citation statements)
references
References 12 publications
0
145
0
8
Order By: Relevance
“…The number of datasets containing modern malware traces is limited. Worth mentioning are ISOT [113] and CTU-13 [114]. The first one is a mixture of malicious and non-malicious datasets.…”
Section: Origin Of the Ideamentioning
confidence: 99%
“…The number of datasets containing modern malware traces is limited. Worth mentioning are ISOT [113] and CTU-13 [114]. The first one is a mixture of malicious and non-malicious datasets.…”
Section: Origin Of the Ideamentioning
confidence: 99%
“…In these studies, P2P botnets are detected by analyzing the behavioral characteristics of the network traffic (Saad et al, 2011;Kheir and Wolley, 2013;Dillon, 2014;He et al, 2014;Almutairi et al, 2016).…”
Section: Review Of Related Literaturementioning
confidence: 99%
“…Machine learning is used because it offers the possibility of automated, real-time recognition of patterns within traffic without a need for traffic exhibiting specific anomalies. Several detection approaches that employ machine learning have been proposed over the years such as in Strayer et al [27], Botminer [8], Lu et al [13], Saad et al [22], and Zhang et al [36], providing more or less efficient botnet detection.…”
Section: Network-based Detectionmentioning
confidence: 99%
“…A recent study in the field of botnet detection by Saad et al [22] considers the problem of detecting P2P botnets by using machine learning techniques. The study evaluates the ability of commonly used machine-learning techniques to meet on-line botnet detection requirements such as adaptability, novelty detection and early detection.…”
Section: Network-based Detectionmentioning
confidence: 99%