2019
DOI: 10.1109/tifs.2018.2881657
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced PeerHunter: Detecting Peer-to-Peer Botnets Through Network-Flow Level Community Behavior Analysis

Abstract: Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the fundamental infrastructure for various cyber-crimes. More challenges are involved in the problem of detecting P2P botnets, despite a few work claimed to detect centralized botnets effectively. We propose Enhanced PeerHunter, a network-flow level community behavior analysis based system, to detect P2P botnets. Our system starts from a P2P network flow detection component. Then, it uses "mutual contacts" to clu… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(13 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…None formally disclosed, architecture discussed instead. [72][73][74][75][76][77] Other botnets use obfuscation tactics to hide the true identity/position of the C&C's location, showcasing a trend of botnets growing more versatile and elusive to researchers.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
confidence: 99%
See 2 more Smart Citations
“…None formally disclosed, architecture discussed instead. [72][73][74][75][76][77] Other botnets use obfuscation tactics to hide the true identity/position of the C&C's location, showcasing a trend of botnets growing more versatile and elusive to researchers.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
confidence: 99%
“…This type of hardened P2P-based botnet is also explored and explained in detail in Andriesse et al [75]. In order to counteract this phenomenon in botnet evolution, entirely new approaches much be made, such as [76], which proposes a different take on detection of P2P botnets, based on its behaviour. Some papers, such as [77], have attempted to model the resilience of P2P botnets to help researchers identify weaknesses and potential mitigation against P2P botnets.…”
Section: P2p-based Botnets and Their Intricaciesmentioning
confidence: 99%
See 1 more Smart Citation
“…Fortunately, IRCbased botnets can be easily defeated by shutting down and restarting the IRC server. However, attackers have found new protocols through which delivering the botnet activities, so that botnets based on HTTP protocol and P2P (Peer-to-Peer) protocol have appeared [24,32]. The latter have the most dangerous characteristics in terms of decentralization and strong resilience, since P2P-based botnets cannot be easily shut down like IRC-based botnets and its activities are more difficult to detect [26,27].…”
Section: Introductionmentioning
confidence: 99%
“…In view of this observation, methods in [7,13,31,32] are all based on botnet behavior, i.e. they classified botnet behavior based on time intervals without having seen a complete network flow.…”
Section: Introductionmentioning
confidence: 99%