A Survey On Botnet Detection Approaches In Peer-To-Peer Network

نویسنده

  • P.Senthil vadivu
چکیده

Peer-to-peer network is a decentralized and distributed network where an individual nodes in the network performs as both providers and consumers of resources. This type of network is different from centralized network. In the centralized network, the client requests queries for accessing resources to the central servers. Malware is a harmful effect in the peer-to-peer networks. In the peer-to-peer network, a new type of malware which is called bots has arisen. Bots are distinctive in that they cooperatively preserve communication structures across nodes to robustly distribute commands from a command and control (C&C) node. The capability to organize and upload new commands to bots provides the botnet owner vast power when performing illegal activities, which contains the ability to organize surveillance attacks, execute DDoS extortion, distribution of spam for pay, and phishing. It is very significant for detecting botnets in the peer-to-peer network. In this survey to analyze different methods of detecting peer-to-peer botnets. BotMiner is one of the detection methods in which a group of hosts as bots belonging to the same botnet if they distribute comparable communication patterns. But this detection method is ineffective and there is restricted in scalability. BotGrep is a detection method which analyzes the network flows composed over multiple large networks by analyzing the communication graph formed by overlay networks. In the following survey to analyze different botnet detection methods to improve the detection accuracy in the peer-to-peer network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey of Peer-to-Peer Botnets and Detection Frameworks

Botnet is a network of compromised computers controlled by the attacker(s) from remote locations via Command and Control (C&C) channels. The botnets are one of the largest global threats to the Internet-based commercial and social world. The decentralized Peer-to-Peer (P2P) botnets have appeared in the recent past and are growing at a faster pace. These P2P botnets are continuously evolving fro...

متن کامل

A Survey on Botnet Architectures, Detection and Defences

Botnets are known to be one of the most serious Internet security threats. In this survey, we review botnet architectures and their controlling mechanisms. Botnet infection behavior is explained. Then, known botnet models are outlined to study botnet design. Furthermore, Fast-Flux Service Networks (FFSN) are discussed in great details as they play an important role in facilitating botnet traffi...

متن کامل

A Survey of Botnet Detection Techniques by Command and Control Infrastructure

Botnets have evolved to become one of the most serious threats to the Internet and there is substantial research on both botnets and botnet detection techniques. This survey reviewed the history of botnets and botnet detection techniques. The survey showed traditional botnet detection techniques rely on passive techniques, primarily honeypots, and that honeypots are not effective at detecting p...

متن کامل

A Model for Covert Botnet Communication in a Private Subnet

Recently, botnets utilizing peer-to-peer style communication infrastructures have been discovered, requiring new approaches to detection and monitoring techniques. Current detection methods analyze network communication patterns, identifying systems that may have been recruited into the botnet. This paper presents a localized botnet communication model that enables a portion of compromised syst...

متن کامل

Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches

State-of-the-art approaches for the detection of peer-topeer (P2P) botnets are on the one hand mostly local and on the other hand tailored to specific botnets involving a great amount of human time, effort, skill and creativity. Enhancing or even replacing this labor-intensive process with automated and, if possible, local network monitoring tools is clearly extremely desirable. To investigate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014