Real-time Detection of Botnet Behavior in Cloud Using Domain Generation Algorithm

被引:0
作者
Kumar, Vimal [1 ]
Kumar, Satish [2 ]
Gupta, Avadhesh Kumar [3 ]
机构
[1] Motilal Nehru Natl Inst Technol, Dept Comp Sci & Engn, Allahabad, Uttar Pradesh, India
[2] Univ Birmingham, Sch Comp Sci, Birmingham, W Midlands, England
[3] Dr APJ Abdul Kalam Tech Univ, Inst Management Studies, Lucknow, Uttar Pradesh, India
来源
INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016 | 2016年
关键词
Botnet; C&C Server; Cyber Attack; DGA; NetFlow; DNS;
D O I
10.1145/2979779.2979848
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ln the last few years, the high acceptability of service computing delivered over the internet has exponentially created immense security challenges for the services providers. Cyber criminals are using advanced malware such as polymorphic botnets for participating in our everyday online activities and trying to access the desired information in terms of personal details, credit card numbers and banking credentials. Polymorphic botnet attack is one of the biggest attacks in the history of cybercrime and currently, millions of computers are infected by the botnet clients over the world. Botnet attack is an intelligent and highly coordinated distributed attack which consists of a large number of bots that generates big volumes of spamming e-mails and launching distributed denial of service (DDoS) attacks on the victim machines in a heterogeneous network environment. Therefore, it is necessary to detect the malicious bots and prevent their planned attacks in the cloud environment. A number of techniques have been developed for detecting the malicious bots in a network in the past literature. This paper recognize the ineffectiveness exhibited by the singnature based detection technique and networktraffic based detection such as NetFlow or traffic flow detection and Anomaly based detection. We proposed a real time malware detection methodology based on Domain Generation Algorithm. It increasesthe throughput in terms of early detection of malicious bots and high accuracy of identifying the suspicious behavior.
引用
收藏
页数:3
相关论文
共 15 条
[1]  
Alam Shahid., 2014, P 7 INT C SECURITY I, P473
[2]  
[Anonymous], HIGH PERFORMANCE CLO
[3]  
Bodke A., 2015, ATCH ME YOU CAN ANTI
[4]  
Gong Fengmin, 2003, DECIPHERING DETECT 2
[5]  
Graham M., 2014, 7 INT C CYB FOR ED T
[6]   Cloud Computing Security: A Survey [J].
Khalil, Issa M. ;
Khreishah, Abdallah ;
Azeem, Muhammad .
COMPUTERS, 2014, 3 (01) :1-35
[7]  
Mowbray M., 2014, 2 IEEE INT WORKSH RE
[8]  
Ollmann G., 2009, Botnet communication topologies
[9]  
Patterson M., 2012, UNLEASHING POWER NET
[10]  
Plohmann D., 2011, Botnets: Detection, measurement, disinfection defence