GADFly: A Fast and Robust Algorithm to Detect P2P Botnets in Communication Graphs

被引:0
|
作者
Joshi, Harshvardhan P. [1 ]
Dutta, Rudra [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Botnets can be used to launch large scale and expensive attacks. Botnets are also difficult to detect and disable, especially when they use peer-to-peer (P2P) command & control structures. In this paper we propose GADFly - a fast and robust algorithm to detect P2P botnet structures in communication graphs built from network flow meta-data. While other algorithms have been proposed in literature that use graph analysis or machine learning techniques to detect botnets, they are either slow or have impractical false positives for realistically large graphs with millions of nodes. They also assume availability of universal communication graph data, which is not realistic. The method proposed here is able to precisely detect P2P botnet structures with extremely low false positive rates. In addition, GADFly is also very fast and robust in the face of gaps in communication graph data, making it suitable for practical deployments.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A novel method of mining network flow to detect P2P botnets
    Lin, Shu-Chiung
    Chen, Patrick S.
    Chang, Chia-Ching
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 645 - 654
  • [2] A Framework for P2P Botnets
    Chang, Su
    Zhang, Linfeng
    Guan, Yong
    Daniels, Thomas E.
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 594 - 599
  • [3] A hybrid technique to detect botnets, based on P2P traffic similarity
    Khan, Riaz Ullah
    Kumar, Rajesh
    Alazab, Mamoun
    Zhang, Xiaosong
    Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019, 2019, : 136 - 142
  • [4] A novel method of mining network flow to detect P2P botnets
    Shu-Chiung Lin
    Patrick S. Chen
    Chia-Ching Chang
    Peer-to-Peer Networking and Applications, 2014, 7 : 645 - 654
  • [5] Estimating the size of P2P botnets
    Koo, Tung-Ming
    Chang, Hung-Chang
    Liao, Wen-Chi
    International Journal of Advancements in Computing Technology, 2012, 4 (12) : 386 - 395
  • [6] Modeling to Understand P2P Botnets
    Li, Huabo
    Hu, Guyu
    Yuan, Jian
    Zhen, Chenghui
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 75 - 78
  • [7] A SURVEY ON P2P BOTNETS DETECTION
    Ghalebandi, Seyedeh Ghazal
    Noor, Rafidah Binti Md
    Lashkari, Arash Habibi
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 725 - +
  • [8] A Survey Of Defense Against P2P Botnets
    Zhang, Wei
    Wang, Yue-Ji
    Wang, Xiao-Lei
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 97 - +
  • [9] A two-phase sequential pattern mining framework to detect stealthy P2P botnets
    Daneshgar, Fateme Faraji
    Abbaspour, Maghsoud
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [10] On Advanced Monitoring in Resilient and Unstructured P2P Botnets
    Karuppayah, Shankar
    Fischer, Mathias
    Rossow, Christian
    Muehlhaeuser, Max
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 871 - 877