Automated Simulation P2P Botnets Signature Detection by Rule-based Approach

被引:0
|
作者
Abdullah, Raihana Syahirah [1 ]
Faizal, M. A. [1 ]
Noh, Zul Azri Muhamad [1 ]
Ahmad, Nurulhuda [2 ]
机构
[1] Univ Tekn Malaysia Melaka UTeM, Fac Informat & Commun Technol, Durian Tunggal 76100, Melaka, Malaysia
[2] Univ Kebangsaan Malaysia, Fac Engn & Built Environm, Bangi 43600, Malaysia
关键词
Botnets; P2P Botnets; Signature; Rule-based;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet is a most salient services in communication. Thus, companies take this opportunity by putting critical resources online for effective business organization. This has given rise to activities of cyber criminals actuated by botnets. P2P networks had gained popularity through distributed applications such as file-sharing, web caching and network storage whereby it is not easy to guarantee that the file exchanged not the malicious in non-centralized authority of P2P networks. For this reason, these networks become the suitable venue for malicious software to spread. It is straightforward for attackers to target the vulnerable hosts in existing P2P networks as bot candidates and build their zombie army. They can be used to compromise a host and make it become a P2P bot. In order to detect these botnets, a complete flow analysis is necessary. In this paper, we proposed an automated P2P botnets through rule-based detection approach which currently focuses on P2P signature illumination. We consider both of synchronisation within a botnets and the malicious behaviour each bot exhibits at the host or network level to recognize the signature and activities in P2P botnets traffic. The rule-based approach have high detection accuracy and low false positive.
引用
收藏
页码:131 / 135
页数:5
相关论文
共 50 条
  • [1] A SURVEY ON P2P BOTNETS DETECTION
    Ghalebandi, Seyedeh Ghazal
    Noor, Rafidah Binti Md
    Lashkari, Arash Habibi
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 725 - +
  • [2] A Signature-behavior-based P2P worm detection approach
    Yao, Yu
    Li, Yong
    Gao, Fu-xiang
    Yu, Ge
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 391 - +
  • [3] Towards Accurate Node-Based Detection of P2P Botnets
    Yin, Chunyong
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [4] VMM-Based Framework for P2P Botnets Tracking and Detection
    Zhou, LingYun
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 172 - 175
  • [5] Resource monitoring for the detection of parasite P2P botnets
    Rodriguez-Gomez, Rafael A.
    Macia-Fernandez, Gabriel
    Garcia-Teodoro, Pedro
    Steiner, Moritz
    Balzarotti, Davide
    COMPUTER NETWORKS, 2014, 70 : 302 - 311
  • [6] Enhanced P2P Botnets Detection Framework Architecture with Hybrid Analysis Approach
    Abdullah, Raihana Syahirah
    Faizal, M. A.
    Noh, Zul Azri Muhamad
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (02): : 62 - 71
  • [7] A Framework for P2P Botnets
    Chang, Su
    Zhang, Linfeng
    Guan, Yong
    Daniels, Thomas E.
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 594 - 599
  • [8] A P2P and Rule-based Web Application Intrusion Prevention System
    Wang Fang
    He Qian
    Wang Yong
    Yao Linlin
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 410 - 414
  • [9] Analysis of P2P, IRC and HTTP traffic for botnets detection
    Basil AsSadhan
    Abdulmuneem Bashaiwth
    Jalal Al-Muhtadi
    Saleh Alshebeili
    Peer-to-Peer Networking and Applications, 2018, 11 : 848 - 861
  • [10] Analysis of P2P, IRC and HTTP traffic for botnets detection
    AsSadhan, Basil
    Bashaiwth, Abdulmuneem
    Al-Muhtadi, Jalal
    Alshebeili, Saleh
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 848 - 861