A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review of Peer-to-Peer Botnet Detection Techniques

In recent years, Peer-to-Peer technology has an extensive use. Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks. They are used to make DDOS attacks, generate spam, click fraud and steal sensitive information. Compared with traditional botnets...

متن کامل

Peer to Peer Botnet Detection System

-In this upcoming highly engaged traffic calls in the Peer to Peer (P2P) botnets the high scalability of detection systems is going down. Where the botmasters adopt modern system to detect traffic which ends in the malicious activities and poor scalability. So in this paper, we proposed a highly scalable botnet detection system for a stealthy peer to peer botnets. In this p2p detection it will ...

متن کامل

Peer-to-Peer Botnet Detection Using NetFlow Master Thesis

. Abstract . . Traditional botnets use a centralized communications architecture where all the bots connect to Command and Control (C&C) servers. These servers are the weak point of the botnet, as they are easy targets for take down and monitoring. Peer-to-peer (p2p) botnets have a distributed architecture, which make them more resilient. This research aims at the detection of individual p2p bo...

متن کامل

An Efficient Scalable System for Peer-To-Peer Botnet Detection

Peer-to-Peer botnets are legally taken by botmasters for the quick recovery against taking down efforts of the system. But it’s a harder one for the botmasters, because modern botnets are hidden and performing malicious activities it makes the process inefficient. Additionally because of sudden growth of the network traffic there was an ability to enlarge the malicious activities of the system....

متن کامل

Peer to Peer Botnet Detection Based on Flow Intervals

Botnets are becoming the predominant threat on the Internet today and is the primary vector for carrying out attacks against organizations and individuals. Botnets have been used in a variety of cybercrime, from click-fraud to DDOS attacks to the generation of spam. In this paper we propose an approach to detect botnet activity by classifying network traffic behavior using machine learning clas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Science

سال: 2014

ISSN: 1549-3636

DOI: 10.3844/jcssp.2014.169.177