A proposed framework for P2P botnet detection

Botnet is most widespread and occurs commonly in today‘s cyber attacks, resulting in serious threats to our network assets and organization’s properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command-and-Con...

Full description

Saved in:
Bibliographic Details
Main Authors: Zeidanloo, Hossein Rouhani, Abdul Manaf, Azizah, Ahmad, Rabiah, Zamani, Mazdak, Chaeikar, Saman Shojae
Format: Article
Language:English
Published: International Association of Computer Science and Information Technology Press 2010
Subjects:
Online Access:http://eprints.utm.my/id/eprint/37017/2/list-30-1.html
http://eprints.utm.my/id/eprint/37017/
http://www.ijetch.org/list-30-1.html
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
Description
Summary:Botnet is most widespread and occurs commonly in today‘s cyber attacks, resulting in serious threats to our network assets and organization’s properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command-and-Control (C&C) infrastructure. They are used to distribute commands to Bots for malicious activities such as distributed denial-of-service (DDoS) attacks, spam and phishing. Most of the existing botnet detection approaches concentrate only on particular botnet command and control (C&C) protocols (e.g., IRC,HTTP) and structures (e.g., centralized), and can become ineffective as botnets change their structure and C&C techniques. In this paper we proposed a new detection framework which focuses on P2P based botnets. This proposed framework is based on our definition of botnets. We define a botnet as a group of bots that will perform similar communication and malicious activity patterns within the same botnet. In our proposed detection framework, we monitor the group of hosts that show similar communication pattern in one stage and also performing malicious activities in another step, and finding common hosts on them.