Automated Simulation P2P Botnets Signature Detection by Rule-based Approach

被引:0
|
作者
Abdullah, Raihana Syahirah [1 ]
Faizal, M. A. [1 ]
Noh, Zul Azri Muhamad [1 ]
Ahmad, Nurulhuda [2 ]
机构
[1] Univ Tekn Malaysia Melaka UTeM, Fac Informat & Commun Technol, Durian Tunggal 76100, Melaka, Malaysia
[2] Univ Kebangsaan Malaysia, Fac Engn & Built Environm, Bangi 43600, Malaysia
关键词
Botnets; P2P Botnets; Signature; Rule-based;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet is a most salient services in communication. Thus, companies take this opportunity by putting critical resources online for effective business organization. This has given rise to activities of cyber criminals actuated by botnets. P2P networks had gained popularity through distributed applications such as file-sharing, web caching and network storage whereby it is not easy to guarantee that the file exchanged not the malicious in non-centralized authority of P2P networks. For this reason, these networks become the suitable venue for malicious software to spread. It is straightforward for attackers to target the vulnerable hosts in existing P2P networks as bot candidates and build their zombie army. They can be used to compromise a host and make it become a P2P bot. In order to detect these botnets, a complete flow analysis is necessary. In this paper, we proposed an automated P2P botnets through rule-based detection approach which currently focuses on P2P signature illumination. We consider both of synchronisation within a botnets and the malicious behaviour each bot exhibits at the host or network level to recognize the signature and activities in P2P botnets traffic. The rule-based approach have high detection accuracy and low false positive.
引用
收藏
页码:131 / 135
页数:5
相关论文
共 50 条
  • [31] An effective node-removal method against P2P botnets
    Dehkordi, Mohammad Jafari
    Sadeghiyan, Babak
    COMPUTER NETWORKS, 2020, 182
  • [32] Behaviour Analysis of Machine Learning Algorithms for detecting P2P Botnets
    Garg, Shree
    Singh, Ankush K.
    Sarje, Anil K.
    Peddoju, Sateesh K.
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES (ICACT), 2013,
  • [33] Detecting and blocking P2P botnets through contact tracing chains
    Huang, Zhiyong
    Zeng, Xiaoping
    Liu, Yong
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2010, 5 (1-2) : 44 - 54
  • [34] Detecting Stealthy P2P Botnets Using Statistical Traffic Fingerprints
    Zhang, Junjie
    Perdisci, Roberto
    Lee, Wenke
    Sarfraz, Unum
    Luo, Xiapu
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 121 - 132
  • [35] A novel method of mining network flow to detect P2P botnets
    Lin, Shu-Chiung
    Chen, Patrick S.
    Chang, Chia-Ching
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 645 - 654
  • [36] Next Generation P2P Botnets: Monitoring Under Adverse Conditions
    Boeck, Leon
    Vasilomanolakis, Emmanouil
    Muehlhaeuser, Max
    Karuppayah, Shankar
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 511 - 531
  • [37] Equitable Machine Learning Algorithms to Probe Over P2P Botnets
    Bharathula, Pavani
    Menon, N. Mridula
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 13 - 21
  • [38] Research on malcode detection based on P2P
    Xin, Yi
    Fang, Binxing
    Yun, Xiaochun
    Hu, Zhenyu
    Gaojishu Tongxin/Chinese High Technology Letters, 2008, 18 (10): : 1029 - 1034
  • [39] Entropy Based P2P Flow Detection
    Shi, Ji-yan
    Yang, Zong-liang
    Liu, Yan
    Liu, Dong-ying
    INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION (ICCA 2016), 2016, : 470 - 474
  • [40] A novel method of mining network flow to detect P2P botnets
    Shu-Chiung Lin
    Patrick S. Chen
    Chia-Ching Chang
    Peer-to-Peer Networking and Applications, 2014, 7 : 645 - 654