A Survey on Host-Based Botnet Identification

被引:0
作者
Ilavarasan, E. [1 ]
Muthumanickam, K. [1 ]
机构
[1] Pondicherry Engn Coll, Dept CSE, Pondicherry, India
来源
2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC) | 2012年
关键词
Behavior Analysis; Bot; Botnet; Kernel; Malware;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today Botnets pose a serious threat to Internet Information world. Because cyber criminals are utilizing them as a powerful tool to achieve their goals easily and most importantly without leaving any trace to the defenders. So it is difficult to detect their origin. They are mainly used for many illegal activities such as Phishing, Spamming, information or email harvesting and DDoS etc. Basically botnets receive command(s) from botmaster using existing network path to attack or compromise a victim. Therefore, to detect a bot/botnet defenders use either network-analysis or end-host analysis. Distinguishing a bot in a high-speed network link is too difficult, because most bots today generate low volume traffic, legitimate protocols and etc. Motivated by this, we propose a comparative study analysis of bot at the end-system side. This area of research is in its infant stage and only very less number of ideas has been proposed.
引用
收藏
页码:166 / 170
页数:5
相关论文
共 22 条
[1]  
[Anonymous], 1 WORKSH HOT TOP UND
[2]  
Baliga Arati, 2011, IEEE T DEPENDABLE SE, V8
[3]  
Ben Salem Malek, SURVEY INSIDER ATTAC
[4]  
Binkley J.R., 2006, P 2 C INT BERK CA US, P967
[5]  
Chung-Huang Yang, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P856, DOI 10.1109/IIH-MSP.2009.303
[6]  
Cooke E., 2005, P USENIX SRUTI WORKS, P39
[7]  
Gu G., 2008, 17 USENIX SEC S USEN
[8]  
Gu Guofei, 2008, P 15 ANN NETWORK DIS
[9]  
Hsu Fu-Hau, 2011, IEEE J SELECTED AREA, V29
[10]  
Hwang Jeaho, APPWATCH DETECTING K