Automated Simulation P2P Botnets Signature Detection by Rule-based Approach

被引:0
|
作者
Abdullah, Raihana Syahirah [1 ]
Faizal, M. A. [1 ]
Noh, Zul Azri Muhamad [1 ]
Ahmad, Nurulhuda [2 ]
机构
[1] Univ Tekn Malaysia Melaka UTeM, Fac Informat & Commun Technol, Durian Tunggal 76100, Melaka, Malaysia
[2] Univ Kebangsaan Malaysia, Fac Engn & Built Environm, Bangi 43600, Malaysia
关键词
Botnets; P2P Botnets; Signature; Rule-based;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet is a most salient services in communication. Thus, companies take this opportunity by putting critical resources online for effective business organization. This has given rise to activities of cyber criminals actuated by botnets. P2P networks had gained popularity through distributed applications such as file-sharing, web caching and network storage whereby it is not easy to guarantee that the file exchanged not the malicious in non-centralized authority of P2P networks. For this reason, these networks become the suitable venue for malicious software to spread. It is straightforward for attackers to target the vulnerable hosts in existing P2P networks as bot candidates and build their zombie army. They can be used to compromise a host and make it become a P2P bot. In order to detect these botnets, a complete flow analysis is necessary. In this paper, we proposed an automated P2P botnets through rule-based detection approach which currently focuses on P2P signature illumination. We consider both of synchronisation within a botnets and the malicious behaviour each bot exhibits at the host or network level to recognize the signature and activities in P2P botnets traffic. The rule-based approach have high detection accuracy and low false positive.
引用
收藏
页码:131 / 135
页数:5
相关论文
共 50 条
  • [41] The novel approach of P2P Botnet node-based detection and applications
    Zhao, Yu, 1600, Journal of Chemical and Pharmaceutical Research, 3/668 Malviya Nagar, Jaipur, Rajasthan, India (06):
  • [42] On the Effectiveness of Structural Detection and Defense Against P2P-based Botnets
    Ha, Duc T.
    Yan, Guanhua
    Eidenbenz, Stephan
    Ngo, Hung Q.
    2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 297 - +
  • [43] Efficient ID-based Threshold Signature in P2P and MANETs
    Liu Zhiyuan
    Feng Yunfang
    Li Jun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4884 - +
  • [44] A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
    Tetarave, Sumit Kumar
    Tripathy, Somanath
    Kalaimannan, Ezhil
    John, Caroline
    Srivastava, Anshika
    IEEE ACCESS, 2019, 7 : 67983 - 67995
  • [45] Detecting P2P Botnets using a Multi-Phased Flow Model
    Noh, Sang-Kyun
    Oh, Joo-Hyung
    Lee, Jae-Seo
    Noh, Bong-Nam
    Jeong, Hyun-Cheol
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL SOCIETY: ICDS 2009, PROCEEDINGS, 2009, : 247 - 253
  • [46] Detecting P2P Botnets through Network Behavior Analysis and Machine Learning
    Saad, Sherif
    Traore, Issa
    Ghorbani, Ali
    Sayed, Bassam
    Zhao, David
    Lu, Wei
    Felix, John
    Hakimian, Payman
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 174 - 180
  • [47] GADFly: A Fast and Robust Algorithm to Detect P2P Botnets in Communication Graphs
    Joshi, Harshvardhan P.
    Dutta, Rudra
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [48] P2P Lending Fraud Detection: A Big Data Approach
    Xu, Jennifer J.
    Lu, Yong
    Chau, Michael
    INTELLIGENCE AND SECURITY INFORMATICS, PAISI 2015, 2015, 9074 : 71 - 81
  • [49] Worm detection system based on P2P networks
    Tang, Haokun
    Liu, Yanbing
    Huang, Jun
    Xiao, Yunpeng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 230 - 235
  • [50] P2P worm detection based on application identification
    Xia C.
    Shi Y.
    Li X.
    Gao W.
    Front. Comput. Sci. China, 2007, 1 (114-122): : 114 - 122