Adaptive behaviour pattern based botnet detection using traffic analysis and flow interavals

被引:0
作者
Kapre, Amruta [1 ]
Padmavathi, B. [1 ]
机构
[1] GH Raisoni Coll Engn & Management, Dept Comp Engn, Pune, Maharashtra, India
来源
2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1 | 2017年
关键词
Botnet; Feature Extraction; Feature Reduction; Legitimate user; Pattern set;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Botnets have become a rampant platform for malicious attacks, which poses a significant threat to internet security. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. A botnet is a group of cooperated computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, junk mail, click fraud, individuality theft and information phishing. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. Most of the TCP/HTTP bot transportations are founded on TCP connections. Of all current threats to cyber security, botnets are at the topmost of the list. In importance, attention in this problem is increasing rapidly among the research community and the number of journals on the question has grown up exponentially in recent years. Signature based detection is not suitable for bot which are variant in nature just like TCP/HTTP bots, So behavior based technique is more suitable for TCP/HTTP botnet detection. In this work PSO and SVM model is used to differentiate legitimate user and TCP/HTTP bot.
引用
收藏
页码:410 / 414
页数:5
相关论文
共 50 条
  • [21] Detection of botnet combining flow similarity and stability analysis
    Jiang, Hongling
    Shao, Xiuli
    Journal of Computational Information Systems, 2012, 8 (17): : 7385 - 7392
  • [22] A fuzzy pattern-based filtering algorithm for botnet detection
    Wang, Kuochen
    Huang, Chun-Ying
    Lin, Shang-Jyh
    Lin, Ying-Dar
    COMPUTER NETWORKS, 2011, 55 (15) : 3275 - 3286
  • [23] Peer to Peer Botnet Detection Based on Flow Intervals
    Zhao, David
    Traore, Issa
    Ghorbani, Ali
    Sayed, Bassam
    Saad, Sherif
    Lu, Wei
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 87 - 102
  • [24] TRAFFIC DETECTION OF TRANSMISSION OF BOTNET THREAT USING BP NEURAL NETWORK
    Li, X. G.
    Wang, J. F.
    NEURAL NETWORK WORLD, 2018, 28 (06) : 511 - 521
  • [25] Botnet Detection Method Based on Survival Analysis
    Wang, Jiajia
    Chen, Yu
    3RD INTERNATIONAL SYMPOSIUM ON MECHATRONICS AND INDUSTRIAL INFORMATICS, (ISMII 2017), 2017, : 146 - 150
  • [26] Using Anomaly Detection Based Techniques to Detect HTTP-based Botnet C&C Traffic
    Sakib, Muhammad N.
    Huang, Chin-Tser
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [27] Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
    Huancayo Ramos, Katherinne Shirley
    Sotelo Monge, Marco Antonio
    Maestre Vidal, Jorge
    SENSORS, 2020, 20 (16) : 1 - 31
  • [28] Botnet Traffic Discriminatory Analysis Using Particle Swarm Optimization
    Zhang, Yan
    Huang, Shuguang
    Wang, Yongyi
    Zhang, Min
    ADVANCES IN SWARM INTELLIGENCE, PT 2, PROCEEDINGS, 2010, 6146 : 499 - 507
  • [29] Method of detecting IRC Botnet based on the multi-features of traffic flow
    Yan, Jian-En
    Yuan, Chun-Yang
    Xu, Hai-Yan
    Zhang, Zhao-Xin
    Tongxin Xuebao/Journal on Communications, 2013, 34 (10): : 49 - 55+64
  • [30] Botnet Detection Approach Using Graph-Based Machine Learning
    Alharbi, Afnan
    Alsubhi, Khalid
    IEEE ACCESS, 2021, 9 (09): : 99166 - 99180