Adaptive behaviour pattern based botnet detection using traffic analysis and flow interavals

被引:0
|
作者
Kapre, Amruta [1 ]
Padmavathi, B. [1 ]
机构
[1] GH Raisoni Coll Engn & Management, Dept Comp Engn, Pune, Maharashtra, India
关键词
Botnet; Feature Extraction; Feature Reduction; Legitimate user; Pattern set;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Botnets have become a rampant platform for malicious attacks, which poses a significant threat to internet security. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. A botnet is a group of cooperated computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, junk mail, click fraud, individuality theft and information phishing. The recent botnets have begun using common protocols such as TCP/HTTP which makes it even harder to distinguish their communication patterns. Most of the TCP/HTTP bot transportations are founded on TCP connections. Of all current threats to cyber security, botnets are at the topmost of the list. In importance, attention in this problem is increasing rapidly among the research community and the number of journals on the question has grown up exponentially in recent years. Signature based detection is not suitable for bot which are variant in nature just like TCP/HTTP bots, So behavior based technique is more suitable for TCP/HTTP botnet detection. In this work PSO and SVM model is used to differentiate legitimate user and TCP/HTTP bot.
引用
收藏
页码:410 / 414
页数:5
相关论文
共 50 条
  • [31] Botnet-based IoT network traffic analysis using deep learning
    Singh, N. Joychandra
    Hoque, Nazrul
    Singh, Kh. Robindro
    Bhattacharyya, Dhruba K.
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [32] Botnet Detection on TCP Traffic Using Supervised Machine Learning
    Velasco-Mata, Javier
    Fidalgo, Eduardo
    Gonzalez-Castro, Victor
    Alegre, Enrique
    Blanco-Medina, Pablo
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2019, 2019, 11734 : 444 - 455
  • [33] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399
  • [34] Sliding Time Analysis in Traffic Segmentation for Botnet Activity Detection
    Hostiadi, Dandy Pramana
    Ahmad, Tohari
    5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022), 2022, : 286 - 291
  • [35] Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic
    Harsha, T.
    Asha, S.
    Soniya, B.
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 471 - 478
  • [36] Honeynet-based botnet scan traffic analysis
    Li, Zhichun
    Goyal, Anup
    Chen, Yan
    BOTNET DETECTION: COUNTERING THE LARGEST SECURITY THREAT, 2008, 36 : 25 - 44
  • [37] Network Flow based IoT Botnet Attack Detection using Deep Learning
    Sriram, S.
    Vinayakumar, R.
    Alazab, Mamoun
    Soman, K. P.
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 189 - 194
  • [38] An efficient flow-based botnet detection using supervised machine learning
    Stevanovic, Matija
    Pedersen, Jens Myrup
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 797 - 801
  • [39] Adaptive pattern mining model for early detection of botnet-propagation scale
    Kim, Do Hoon
    Lee, Taek
    Kang, Jaewoo
    Jeong, Hyunchoel
    In, Hoh Peter
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (08) : 917 - 927
  • [40] ARCHITECTURE FOR APPLYING DATA MINING AND VISUALIZATION ON NETWORK FLOW FOR BOTNET TRAFFIC DETECTION
    Shahrestani, Alireza
    Feily, Maryam
    Ahmad, Rodina
    Ramadass, Sureswaran
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 1, 2009, : 33 - +