2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.68
|View full text |Cite
|
Sign up to set email alerts
|

Heuristics for Detecting Botnet Coordinated Attacks

Abstract: This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting behavior of downloads and the port-scans. The analyses show that some new features of the coordinated attacks performed by Botnet, e.g., some particular strings contained in packets in downloading malwares, and the common patterns in downloading malwares from distributed servers.Based on the analysis, the paper proposes the heuristic techni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The botnet has a feature that coordinated attacks of multiple servers making a victim infected by a set of malwares [7]. For example, Table IV shows sequential infections observed the Cyber Clean Center (CCC) DATAset 2009, the captured packets data by 94 honeypots [5] in which a host is infected by three malwares, PE_VIRUT.AV, TROJ_BUZUS.AGB and WORM_SWTYMLAI.CD as scheduled in the same way.…”
Section: A Definitionmentioning
confidence: 99%
“…The botnet has a feature that coordinated attacks of multiple servers making a victim infected by a set of malwares [7]. For example, Table IV shows sequential infections observed the Cyber Clean Center (CCC) DATAset 2009, the captured packets data by 94 honeypots [5] in which a host is infected by three malwares, PE_VIRUT.AV, TROJ_BUZUS.AGB and WORM_SWTYMLAI.CD as scheduled in the same way.…”
Section: A Definitionmentioning
confidence: 99%
“…Botnets are detected using different characteristics of the network traffic, for example, using networks statistics , communication protocols , suspicious traffic behavior , graphical representations of behaviors , actions in honeypots , behavioral features , collaborative feedback in large networks and malicious actions . However, botnets evolve and thus make obsolete most detection methods.…”
Section: Introductionmentioning
confidence: 99%
“…Heuristic techniques for the detection of malware involved in botnet coordinated attacks [15] provide useful information for determining the characteristics of and relationships between botnet attacks. However, heuristic approaches are ad hoc and therefore unable to adapt to any new attack.…”
Section: Related Workmentioning
confidence: 99%