DETECTION OF STEALTHY P2P BOT COMPROMISED HOSTS IN A NETWORK

Abstract

Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the way they perform malicious activities, making current detection approaches ineffective. In addition, the rapidly growing volume of network traffic calls for high scalability of detection systems. In this paper, we propose a novel scalable botnet detection system capable of detecting stealthy P2P botnets. Our system first identifies all hosts that are likely engaged in P2P communications. It then derives statistical fingerprints to profile P2P traffic and further distinguish between P2P botnet traffic and legitimate P2P traffic. The parallelized computation with bounded complexity makes scalability a built-infeature of our system. Extensive evaluation has demonstrated both high detection accuracy and great scalability of the proposed system.

Authors and Affiliations

Raveesha H H

Keywords

Related Articles

SUB-CRITICAL ANNEALING OF WOOTZ INGOTS FOR CORRECT FORGING OF DAMASCUS STEEL ACCORDING TO MEDIEVAL CHRONICLES

A closer look at the manufacturing process of Damascus steels (al hindi), based on archaeological and historical sources to develop a hypothesis that leads us to the technology required to forge this steel correctly.

 STUDY AND ANALYSIS ON PACKET SNIFFING TOOL CAIN AND ABEL- A REVIEW

 Packet sniffing is a process which uses software or hardware devices to monitor and capture all data packets that are passing through any given network. Packet sniffing is a kind of wiretap which overseer telephon...

 A STUDY ON ELECTRICALLY CONTROLLED SOLID PROPELLANTS

 Present Study focuses on the type of solid propellant whose burn process can be controlled electrically. The major disadvantage of solid propellant is once extinguish it can’t be stopped which may lead any mis-hap...

 Novel Web Proxy Cache Replacement Algorithms using Machine Learning Techniques for Performance Enhancement

 A web cache is a mechanism for the temporary storage (caching) of web documents, such as HTML pages and images, to reduce bandwidth usage, server load, and perceived lag. A web cache stores copies of documents pa...

 A NEW APPROACH FOR VIDEO OBJECT MINING: ISSUES AND CHALLENGES

 In these days, due to the increasing rate of video data over the World Wide Web, it is becoming very essential to extract useful information from visual data. The video data consists of various objects as its impo...

Download PDF file
  • EP ID EP123176
  • DOI 10.5281/zenodo.56028
  • Views 62
  • Downloads 0

How To Cite

Raveesha H H (30). DETECTION OF STEALTHY P2P BOT COMPROMISED HOSTS IN A NETWORK. International Journal of Engineering Sciences & Research Technology, 5(6), 843-846. https://europub.co.uk/articles/-A-123176