Adaptive behaviour pattern based botnet detection using traffic analysis and flow interavals

被引:0
|
作者
Kapre, Amruta [1 ]
Padmavathi, B. [1 ]
机构
[1] GH Raisoni Coll Engn & Management, Dept Comp Engn, Pune, Maharashtra, India
关键词
Botnet; Feature Extraction; Feature Reduction; Legitimate user; Pattern set;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Botnets have become a rampant platform for malicious attacks, which poses a significant threat to internet security. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. A botnet is a group of cooperated computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, junk mail, click fraud, individuality theft and information phishing. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. Most of the TCP/HTTP bot transportations are founded on TCP connections. Of all current threats to cyber security, botnets are at the topmost of the list. In importance, attention in this problem is increasing rapidly among the research community and the number of journals on the question has grown up exponentially in recent years. Signature based detection is not suitable for bot which are variant in nature just like TCP/HTTP bots, So behavior based technique is more suitable for TCP/HTTP botnet detection. In this work PSO and SVM model is used to differentiate legitimate user and TCP/HTTP bot.
引用
收藏
页码:410 / 414
页数:5
相关论文
共 50 条
  • [1] Adaptive behaviour pattern based botnet detection using traffic analysis and flow interavals
    2017, Institute of Electrical and Electronics Engineers Inc., United States (2017-January):
  • [2] Behaviour based botnet detection with traffic analysis and flow interavals using PSO and SVM
    Kapre, Amruta
    Padmavathi, B.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 718 - 722
  • [3] Botnet detection based on traffic behavior analysis and flow intervals
    Zhao, David
    Traore, Issa
    Sayed, Bassam
    Lu, Wei
    Saad, Sherif
    Ghorbani, Ali
    Garant, Dan
    COMPUTERS & SECURITY, 2013, 39 : 2 - 16
  • [4] Flow Based Botnet Traffic Detection Using Machine Learning
    Gahelot, Parul
    Dayal, Neelam
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 418 - 426
  • [5] Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic
    Shang, Yaoyao
    Yang, Shuangmao
    Wang, Wei
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 612 - 621
  • [6] Botnet Detection Based on Analysis of Mail Flow
    Wang Chun-dong
    Li Ting
    Wang Huai-bin
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2067 - 2070
  • [7] Botnet detection based on network flow analysis using inverse statistics
    Lopes, Daniele A. G.
    Marotta, Marcelo A.
    Ladeira, Marcelo
    Gondim, Joao J. C.
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [8] Botnet Detection Based on Traffic Monitoring
    Zeidanloo, Hossein Rouhani
    Manaf, Azizah Bt
    Vahdani, Payam
    Tabatabaei, Farzaneh
    Zamani, Mazdak
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 97 - 101
  • [9] A Distributed Botnet Detecting Approach Based on Traffic Flow Analysis
    Li Sheng
    Liu Zhiming
    He Jin
    Deng Gaoming
    Huang Wen
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 124 - 128
  • [10] IRC traffic analysis for botnet detection
    Mazzariello, Claudio
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 318 - 323