Botnet detection based on traffic behavior analysis and flow intervals

Computers & Security - Tập 39 - Trang 2-16 - 2013
David Zhao1, Issa Traoré1, Bassam Sayed1, Wei Lu2, Sherif Saad1, Ali A. Ghorbani3, Dan Garant2
1Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada V8W 3P6
2Keene State College, NH, USA#TAB#
3Faculty of Computer Science, University of New Brunswick, NB, Canada

Tóm tắt

Từ khóa


Tài liệu tham khảo

Al-Duwairi, 2010, BotDigger: a fuzzy inference system for botnet detection, 16

Feily, 2009, A survey of botnet and botnet detection, 268

Gao, 2009, A novel P2P traffic identification scheme based on support vector machine fuzzy network, 909

Giroire, 2009, Exploiting temporal persistence to detect covert botnet channels, 326

Grizzard, 2007, Peer-to-peer botnets: overview and case study

Gu, 2007, BotHunter: detecting malware infection through IDS-driven dialog correlation, 167

Gu, 2008, BotSniffer: detecting botnet command and control channels in network traffic

Gu, 2008, BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection

Holz, 2008, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm

Lawrence Berkeley National Laboratory and ICSI, 2005

Leonard, 2009, A framework for understanding botnets, 917

Li, 2007, P2P traffic identification technique, 37

Livadas, 2006, Using machine learning techniques to identify botnet traffic, 967

Masud, 2008

Nazario, 2007, 11

openpacket.org. Zeus/Zbot sample traffic and C& C traffic. Retrieved October 29, 2012, from www.openpacket.org.

Rajab, 2006, A multifaceted approach to understanding the botnet phenomenon

Saad, 2011, Detecting P2P botnets through network behavior analysis and machine learning

Shiravi, 2012, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, Elsevier, 31, 357, 10.1016/j.cose.2011.12.012

Sinclair, 2009, The Waledac protocol: the how and why, 69

Snort, 1999, Lightweight intrusion detection for networks, 229

Sperotto, 2010, An overview of IP flow-based intrusion detection, IEEE Communications Surveys & Tutorial, 12, 343, 10.1109/SURV.2010.032210.00054

Szab, 2008, On the validation of traffic classification algorithms, 72

The Honeynet Project. French Chapter [Online] http://www.honeynet.org/chapters/france.

Villamarn-Salomn, 2009, Bayesian bot detection based on DNS traffic similarity, 2035

Wang, 2007, An advanced hybrid peer-to-peer botnet

Wang, 2009, Measuring peer-to-peer botnets using control flow stability, 663

Witten, 1999

Wurzinger, 2009, Automatically generating models for botnet detection, vol. 5789, 232

Yu, 2010, Online botnet detection based on incremental discrete Fourier transform, Journal of Networks, 5, 10.4304/jnw.5.5.568-576

Zeidanloo, 2012

Zhao, 2012, Peer-to-peer botnet detection based on flow intervals