Multi Attribute Real Time Traffic Inference Algorithm for Botnet Detection in Mobile Ad Hoc Network

被引:0
作者
Kavitha, G. [1 ]
机构
[1] Govt Coll Engn, Dept ECE, Salem 636011, India
关键词
MANET; Botnet; Real time traffic inference; Botnet detection;
D O I
10.1007/s11277-018-5384-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The issue of botnet detection has been talked about in a few articles and there are number of techniques has been examined before. The earlier discussed methods handle the botnet detection in stable/unstable networks with little proximity and produces more false results. To overcome the problem of botnet detection in unstable mobile ad hoc network with dynamic addressing schemes, we propose a multi attribute real time traffic inference model algorithm to perform botnet detection. The method sticks to the basics of unstable network conditions and with the restriction of storage scalability. With this limitation, the nodes maintain small set of trace about the earlier transmission and the node details participated in the transmission. Upon receiving the packets from the neighbor node, the method extracts the features from the packet and performs traffic inference performed based on the other routes available to reach the destination. Also, the method identifies the hop details to identify the presence of botnet. Based on both the results the method eliminates the botnet from the network to improve the performance of the network.
引用
收藏
页码:3465 / 3476
页数:12
相关论文
共 13 条
  • [1] [Anonymous], 2014, INT C SEC COMP NETW
  • [2] Chanda K, 2014, INT J COMPUTER APPL, V91, P12
  • [3] On the Effectiveness of Different Botnet Detection Approaches
    Haddadi, Fariba
    Le Cong, Duc
    Porter, Laura
    Zincir-Heywood, A. Nur
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 121 - 135
  • [4] Ji Y., 2014, INT C INFORM SECURIT, P75, DOI DOI 10.1007/978-3-319-06320-1_7
  • [5] Botnet detection techniques: review, future trends, and issues
    Karim, Ahmad
    Bin Salleh, Rosli
    Shiraz, Muhammad
    Shah, Syed Adeel Ali
    Awan, Irfan
    Anuar, Nor Badrul
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2014, 15 (11): : 943 - 983
  • [6] Nagaraja S, 2014, LECT NOTES COMPUT SC, V8713, P439, DOI 10.1007/978-3-319-11212-1_25
  • [7] PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification
    Narang, Pratik
    Hota, Chittaranjan
    Venkatakrishnan, V. N.
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2014, (01): : 1 - 12
  • [8] Pomorova O, 2014, COMM COM INF SC, V431, P265
  • [9] Schiavoni S, 2014, LECT NOTES COMPUT SC, V8550, P192
  • [10] Tyagi Amit Kumar, 2012, INT J APPL INFORM SY, V2, P34