Adaptive behaviour pattern based botnet detection using traffic analysis and flow interavals

被引:0
|
作者
Kapre, Amruta [1 ]
Padmavathi, B. [1 ]
机构
[1] GH Raisoni Coll Engn & Management, Dept Comp Engn, Pune, Maharashtra, India
关键词
Botnet; Feature Extraction; Feature Reduction; Legitimate user; Pattern set;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Botnets have become a rampant platform for malicious attacks, which poses a significant threat to internet security. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. A botnet is a group of cooperated computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, junk mail, click fraud, individuality theft and information phishing. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. Most of the TCP/HTTP bot transportations are founded on TCP connections. Of all current threats to cyber security, botnets are at the topmost of the list. In importance, attention in this problem is increasing rapidly among the research community and the number of journals on the question has grown up exponentially in recent years. Signature based detection is not suitable for bot which are variant in nature just like TCP/HTTP bots, So behavior based technique is more suitable for TCP/HTTP botnet detection. In this work PSO and SVM model is used to differentiate legitimate user and TCP/HTTP bot.
引用
收藏
页码:410 / 414
页数:5
相关论文
共 50 条
  • [21] Botnet Identification Based on Flow Traffic by Using K-Nearest Neighbor
    Gunawan, Dani
    Hairani, Tika
    Hizriadi, Ainul
    2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS 2019), 2019, : 95 - 99
  • [22] Botnet traffic detection using RPCA and Mahalanobis Distance
    Vilaca, Eduardo S. C.
    Vieira, Thiago P. B.
    de Sousa, Rafael T.
    da Costa, Joao Paulo C. L.
    2019 WORKSHOP ON COMMUNICATION NETWORKS AND POWER SYSTEMS (WCNPS), 2019,
  • [23] Distributed System for Botnet Traffic Analysis and Anomaly Detection
    Kozik, Rafal
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 330 - 335
  • [24] BotCVD: Visual analysis of DNS traffic for botnet detection
    Jiang, H. (hellojhl@163.com), 1600, Advanced Institute of Convergence Information Technology (04):
  • [25] Peer-to-Peer BotNet Traffic Analysis and Detection
    Han, Dongseok
    Han, Kyoung Soo
    Kang, Boojoong
    Han, Hwansoo
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (04): : 1605 - 1624
  • [26] A Conformalized Density-based Clustering Analysis of Malicious Traffic for Botnet Detection
    Kiani, Bahareh Mohammadi
    CONFORMAL AND PROBABILISTIC PREDICTION AND APPLICATIONS, VOL 128, 2020, 128 : 244 - 256
  • [27] Adaptive traffic sampling for P2P botnet detection
    He, Jie
    Yang, Yuexiang
    Wang, Xiaolei
    Tan, Zhiguo
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (05)
  • [28] Pattern Analysis and Regressive Linear Measure for Botnet Detection
    Padmavathi, B.
    Muthukumar, B.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (01): : 119 - 139
  • [29] An advanced method for detection of botnet traffic using Intrusion Detection System
    Koli, Manoj S.
    Chavan, Manik K.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 481 - 485
  • [30] A fully scalable big data framework for Botnet detection based on network traffic analysis
    Mousavi, S. H.
    Khansari, M.
    Rahmani, R.
    INFORMATION SCIENCES, 2020, 512 : 629 - 640