Adaptive behaviour pattern based botnet detection using traffic analysis and flow interavals

被引:0
作者
Kapre, Amruta [1 ]
Padmavathi, B. [1 ]
机构
[1] GH Raisoni Coll Engn & Management, Dept Comp Engn, Pune, Maharashtra, India
来源
2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1 | 2017年
关键词
Botnet; Feature Extraction; Feature Reduction; Legitimate user; Pattern set;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Botnets have become a rampant platform for malicious attacks, which poses a significant threat to internet security. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. A botnet is a group of cooperated computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, junk mail, click fraud, individuality theft and information phishing. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. Most of the TCP/HTTP bot transportations are founded on TCP connections. Of all current threats to cyber security, botnets are at the topmost of the list. In importance, attention in this problem is increasing rapidly among the research community and the number of journals on the question has grown up exponentially in recent years. Signature based detection is not suitable for bot which are variant in nature just like TCP/HTTP bots, So behavior based technique is more suitable for TCP/HTTP botnet detection. In this work PSO and SVM model is used to differentiate legitimate user and TCP/HTTP bot.
引用
收藏
页码:410 / 414
页数:5
相关论文
共 50 条
  • [31] Method of detecting IRC Botnet based on the multi-features of traffic flow
    Yan, Jian-En
    Yuan, Chun-Yang
    Xu, Hai-Yan
    Zhang, Zhao-Xin
    Tongxin Xuebao/Journal on Communications, 2013, 34 (10): : 49 - 55+64
  • [32] Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection
    Bottazzi, Giovanni
    Italiano, Giuseppe F.
    Rutigliano, Giuseppe G.
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 76 - 80
  • [33] Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic
    Niu Weina
    Jiang Tianyu
    Zhang Xiaosong
    Xie Jiao
    Zhang Junzhe
    Zhao Zhenfei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1872 - 1880
  • [34] Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic
    Niu W.
    Jiang T.
    Zhang X.
    Xie J.
    Zhang J.
    Zhao Z.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1872 - 1880
  • [35] P2P Botnet Detection Method Based on Data Flow
    Wang Jiajia
    Chen Yu
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL SYMPOSIUM ON ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (ISAEECE 2017), 2017, 124 : 235 - 239
  • [36] FLOW BASED BOTNET DETECTION THROUGH SEMI-SUPERVISED ACTIVE LEARNING
    Qiu, Zhicong
    Miller, David J.
    Kesidis, George
    2017 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2017, : 2387 - 2391
  • [37] Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness
    Cafuta, Davor
    Sruk, Vlado
    Dodig, Ivica
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2018, 25 (02): : 390 - 400
  • [38] An Efficient Flow based Botnet Classification using Convolution Neural Network
    Kant, Vattan
    Singh, Mandeep
    Ojha, Nitish
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 941 - 946
  • [39] BotcoinTrap: Detection of Bitcoin Miner Botnet Using Host Based Approach
    Zareh, Atefeh
    Shahriari, Hamid Reza
    2018 15TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2018,
  • [40] Modeling Botnet C&C Traffic Lifespans from NetFlow Using Survival Analysis
    Oujezsky, Vaclav
    Horvath, Tomas
    Skorpil, Vladislav
    2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 50 - 55