2017
DOI: 10.1007/978-3-319-70139-4_45
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Botnet Activities Through the Lens of a Large-Scale Darknet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…Here, we present some prior research that had a similar scope to our problem and used darknet traffic but did not focus on synchronization. There are several methods to detect anomalies by detecting change points in darknet traffic, such as ChangeFinder that was introduced as a comparison method in a previous study [10], [59]- [61]. Ahmedet al proposed a sliding window-based adaptive cumulative sum (CUSUM) algorithm, which is a sequential analysis method for detecting drastic changes in darknet traffic [59].…”
Section: B Malware Activity Detection On Darknetsmentioning
confidence: 99%
See 2 more Smart Citations
“…Here, we present some prior research that had a similar scope to our problem and used darknet traffic but did not focus on synchronization. There are several methods to detect anomalies by detecting change points in darknet traffic, such as ChangeFinder that was introduced as a comparison method in a previous study [10], [59]- [61]. Ahmedet al proposed a sliding window-based adaptive cumulative sum (CUSUM) algorithm, which is a sequential analysis method for detecting drastic changes in darknet traffic [59].…”
Section: B Malware Activity Detection On Darknetsmentioning
confidence: 99%
“…Inoue et al [60] employed the ChangeFinder algorithm [10] to detect sudden change points in darknet traffic with a low computational cost. Ban et al proposed an abrupt-change detection algorithm that can detect botnet probe campaigns with a high detection rate by searching for temporal coincidences in botnet activities observed on the darknet [61]. The aforementioned change detection methods all share the same drawback-they cannot achieve high accuracy without focusing on specific protocol ports because they detect change points without distinguishing between many sources of noisy communications, such as misconfigured traffic.…”
Section: B Malware Activity Detection On Darknetsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, these change point detection methods have many limitations in actual operation. For example, when analyzing all TCP destination port numbers separately (2 16 ), an enormous amount of alerts can be obtained, and multiple high-performance servers are required. As an alternative, it is conceivable to aggregate and analyze for each range of the destination port number, but it is necessary to adjust the parameters according to the time when the traffic volume changes dramatically or moderately.…”
Section: Related Workmentioning
confidence: 99%
“…In prior research [1], [2], [14], [7], [15], [10], [9], [16], [17], [5], [18], [19], darknet data is used to detect botnet hosts, typically by clustering and classifying the src IPs with features such as the dst port and packet size.…”
Section: A Mining Darknet Trafficmentioning
confidence: 99%