2016
DOI: 10.1016/j.jnca.2016.10.007
|View full text |Cite
|
Sign up to set email alerts
|

Survey of approaches and features for the identification of HTTP-based botnet traffic

Abstract: Botnet use is on the rise, with a growing number of botmasters now switching to the HTTP-based C&C infrastructure. This offers them more stealth by allowing them to blend in with benign web traffic. Several works have been carried out aimed at characterising or detecting HTTP-based bots, many of which use network communication features as identifiers of botnet behaviour. In this paper, we present a survey of these approaches and the network features they use in order to highlight how botnet traffic is currentl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0
1

Year Published

2017
2017
2019
2019

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 46 publications
(26 citation statements)
references
References 29 publications
0
25
0
1
Order By: Relevance
“…In Section 4, we compare our experimental results with these works to show the advantages of our approach in terms of accuracy. For more references on Botnet identification, we recommend Silva et al and Acarali et al…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In Section 4, we compare our experimental results with these works to show the advantages of our approach in terms of accuracy. For more references on Botnet identification, we recommend Silva et al and Acarali et al…”
Section: Related Workmentioning
confidence: 99%
“…In Section 4, we compare our experimental results with these works to show the advantages of our approach in terms of accuracy. For more references on Botnet identification, we recommend Silva et al 36 and Acarali et al 1 Livadas et al 26 propose a two-stage method to detect IRC-based C&C channels using 10 features extracted from network flows. In the first stage, a classifier detects the IRC connections and the second stage is used to classify the IRC connections into "normal" and "C&C."…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, DGA can now be regarded as a feature of financial botnets based on HTTP. The majority of botnets based on HTTP [14,15], such as Shylock, Carberp, and Zeus, utilize DGA to empower their C and C communication channels; therefore, it is more complex to fingerprint the C and C servers. The DGA implementation in Zeus and Carberp botnets will provide attackers a safe fallback mechanism in case P2P communication fails.…”
Section: Future Internetmentioning
confidence: 99%
“…1,2 A botnet is a coordinated group of infected bots that receive orders from an attacker (ie, botmaster), via various command and control (C&C) channels. The formidable spread of botnets and their growing ability to resist being detected have motivated research community to explore more intelligent techniques for detecting botnets.…”
Section: Introductionmentioning
confidence: 99%