DETECTION OF STEALTHY P2P BOT COMPROMISED HOSTS IN A NETWORK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 6
Abstract
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the way they perform malicious activities, making current detection approaches ineffective. In addition, the rapidly growing volume of network traffic calls for high scalability of detection systems. In this paper, we propose a novel scalable botnet detection system capable of detecting stealthy P2P botnets. Our system first identifies all hosts that are likely engaged in P2P communications. It then derives statistical fingerprints to profile P2P traffic and further distinguish between P2P botnet traffic and legitimate P2P traffic. The parallelized computation with bounded complexity makes scalability a built-infeature of our system. Extensive evaluation has demonstrated both high detection accuracy and great scalability of the proposed system.
Authors and Affiliations
Raveesha H H
PERFORMANCE EVALUATION OF BLENDS OF MAHUA OIL METHYL ESTER FOR COMPRESSION IGNITION ENGINE
Decline in fossil fuel resources along with high crude oil prices generated attention towards the development of fuel from alternate sources. One of the best alternatives is biodiesels obtained from different vegetable...
A SURVEY ON ITEMSET MINING FOR LARGE TRANSACTION DATABASE
Mining itemsets from the databases is an important data mining task.Frequent itemset mining refers to the mining of set of items occur frequently in the database.Utility itemset mining refers to the discovery of items w...
Business Viability of off Grid Hybrid Biomass model over on Grid Solar Generation for RE in Developing countries
This paper outline the business viability of Distributed or Stand-alone hybrid power system consisting of Biomass and Diesel versus Traditional Top down grid connected solar power generation. The environment cons...
AN EXPERIMENTAL STUDY ON RC CONTINUOUS BEAM STRENGTHENED BY USING FRP SHEET
Strengthening structures using external bonding of advanced fiber reinforced polymer (FRP) composite is in its advent around the world from the past decade for it is more economically and technically effective and...
Efficient Load Balancing With Distributed Hash Tables in Cloud
Distributed file systems are key building blocks for cloud computing applications based on the Map Reduce programming paradigm. In such file systems, nodes all at once serve computing and storage functions; a file...