DETECTION OF STEALTHY P2P BOT COMPROMISED HOSTS IN A NETWORK

Abstract

Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the way they perform malicious activities, making current detection approaches ineffective. In addition, the rapidly growing volume of network traffic calls for high scalability of detection systems. In this paper, we propose a novel scalable botnet detection system capable of detecting stealthy P2P botnets. Our system first identifies all hosts that are likely engaged in P2P communications. It then derives statistical fingerprints to profile P2P traffic and further distinguish between P2P botnet traffic and legitimate P2P traffic. The parallelized computation with bounded complexity makes scalability a built-infeature of our system. Extensive evaluation has demonstrated both high detection accuracy and great scalability of the proposed system.

Authors and Affiliations

Raveesha H H

Keywords

Related Articles

 Vigorous Source Provisioning With Virtualization through Skewness in Cloud

 The recent emergence of public cloud offerings, surge computing -outsourcing tasks from an enclosed knowledge centre to a cloud supplier in times of serious load- has become a lot of accessible to a large vary of...

 SURVEY PAPER ON THE PROBLEM FOR PARKING VEHICLES IN THE CITY

 If we will say about the population of cities and of course India is increasing day by day. If consider the problems of cities than the traffic has become the crucial factor for any city and we will get the space...

 PERFORMANCE OF WAVELET PACKET BASED SPECTRUM SENSING IN COGNITIVE RADIO FOR DIFFERENT WAVELET FAMILIES

 Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. The cognitive Radio built on...

 Synthesis of MTiO3 (M = Ba, Sr) Nanoparticles in n-butylamine by Following a Solvothermal Route

 Barium titanate (BaTiO3) and strontium titanate (SrTiO3) nanoparticles are prepared in n-butylamine by following a solvothermal route. The as-prepared BaTiO3 and SrTiO3 nanoparticles were characterized by X-ray d...

 A Review Paper on Metamaterial

 In this paper a brief review about metamaterials is given. Here we discus different type of metamaterials composite structure used in antenna engineering. Compared with the conventional materials, metamaterials ex...

Download PDF file
  • EP ID EP123176
  • DOI 10.5281/zenodo.56028
  • Views 83
  • Downloads 0

How To Cite

Raveesha H H (30). DETECTION OF STEALTHY P2P BOT COMPROMISED HOSTS IN A NETWORK. International Journal of Engineering Sciences & Research Technology, 5(6), 843-846. https://europub.co.uk/articles/-A-123176