Skip to main content

2012 | OriginalPaper | Buchkapitel

56. A Survey on P2P Botnet Detection

verfasst von : Kyoung-Soo Han, Eul Gyu Im

Erschienen in: Proceedings of the International Conference on IT Convergence and Security 2011

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently cyber-attacks in Internet using botnets have been increased. Also, crimes involved in monetary profits through cyber-attacks have been continuously increased. Attackers can use P2P botnets to launch various attacks such as Distributed Denial of Service (DDoS), malware propagation, and so on. For this reason, P2P botnet detection techniques have been studied. This paper is a survey of P2P botnet detection, and describes about the general type of P2P botnets and detection methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Freiling F, Holz T, Wicherski G (2005) Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks. In: Proceedings of the 10th European symposium on research in computer security. pp 319–335 Freiling F, Holz T, Wicherski G (2005) Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks. In: Proceedings of the 10th European symposium on research in computer security. pp 319–335
2.
Zurück zum Zitat Zhu Z, Lu G, Chen Y, Fu ZJ, Roberts P, Han K (2008) Botnet research survey. In: Proceedings of the 32nd annual IEEE international conference on computer software and applications. pp 967–972 Zhu Z, Lu G, Chen Y, Fu ZJ, Roberts P, Han K (2008) Botnet research survey. In: Proceedings of the 32nd annual IEEE international conference on computer software and applications. pp 967–972
3.
Zurück zum Zitat Choi H, Lee H, Lee H, Kim H (2007) Botnet detection by monitoring group activities in DNS traffic. In: Proceedings of the 7th IEEE international conference on computer and information technology. pp 715–720 Choi H, Lee H, Lee H, Kim H (2007) Botnet detection by monitoring group activities in DNS traffic. In: Proceedings of the 7th IEEE international conference on computer and information technology. pp 715–720
4.
Zurück zum Zitat Ha DT, Yan G, Eidenbenz S, Ngo HQ (2009) On the effectiveness of structural detection and defense against P2P-based botnets. In: Proceedings of the 39th annual IEEElIFIP international conference on dependable systems and networks, pp 297–306 Ha DT, Yan G, Eidenbenz S, Ngo HQ (2009) On the effectiveness of structural detection and defense against P2P-based botnets. In: Proceedings of the 39th annual IEEElIFIP international conference on dependable systems and networks, pp 297–306
5.
Zurück zum Zitat Liao W, Chang C (2010) Peer to peer botnet detection using data mining scheme. In: Proceedings of the international conference on internet technology and applications, pp 1–4 Liao W, Chang C (2010) Peer to peer botnet detection using data mining scheme. In: Proceedings of the international conference on internet technology and applications, pp 1–4
6.
Zurück zum Zitat Noh SK, Oh JH, Lee JS, Noh BN, Jeong HC (2009) “Detecting P2P botnets using a multi-phased flow model. In: Proceedings of the 3rd international conference on digital society IEEE, pp 247–253 Noh SK, Oh JH, Lee JS, Noh BN, Jeong HC (2009) “Detecting P2P botnets using a multi-phased flow model. In: Proceedings of the 3rd international conference on digital society IEEE, pp 247–253
7.
Zurück zum Zitat Han KS, Lim KH, Im EG (2009) The Traffic Analysis of P2P-based Storm Botnet using Honeynet. J KIISC 19(4):51–61 Han KS, Lim KH, Im EG (2009) The Traffic Analysis of P2P-based Storm Botnet using Honeynet. J KIISC 19(4):51–61
8.
Zurück zum Zitat Liu D, Li Y, Hu Y, Liang Z (2010) A P2P-botnet detection model and algorithms based on network streams analysis. In: Proceedings of the international conference on future information technology and management engineering, pp 55–58 Liu D, Li Y, Hu Y, Liang Z (2010) A P2P-botnet detection model and algorithms based on network streams analysis. In: Proceedings of the international conference on future information technology and management engineering, pp 55–58
9.
Zurück zum Zitat Saad S, Traore I, Ghorbani A, Sayed B, Zhao D, Lu W, elix J, Hakimian P (2011) “Detecting P2P botnets through network behavior analysis and machine learning. In: Proceedings of the 9th annual international conference on privacy, security and trust, pp 174–180 Saad S, Traore I, Ghorbani A, Sayed B, Zhao D, Lu W, elix J, Hakimian P (2011) “Detecting P2P botnets through network behavior analysis and machine learning. In: Proceedings of the 9th annual international conference on privacy, security and trust, pp 174–180
10.
Zurück zum Zitat Gu G, Perdisci R, Zhang J, Lee W (2008) BotMiner: clustering Analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th conference on security symposium, pp 139–154 Gu G, Perdisci R, Zhang J, Lee W (2008) BotMiner: clustering Analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th conference on security symposium, pp 139–154
11.
Zurück zum Zitat Zhang J, Perdisci R, Lee W, Sarfraz U, Luo X (2011) Detecting stealthy P2P botnets using statistical traffic fingerprints. In: IEEE/IFIP 41st international conference on dependable systems and networks, pp 121–132 Zhang J, Perdisci R, Lee W, Sarfraz U, Luo X (2011) Detecting stealthy P2P botnets using statistical traffic fingerprints. In: IEEE/IFIP 41st international conference on dependable systems and networks, pp 121–132
Metadaten
Titel
A Survey on P2P Botnet Detection
verfasst von
Kyoung-Soo Han
Eul Gyu Im
Copyright-Jahr
2012
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-2911-7_56

Neuer Inhalt