Skip to main content
Top
Published in:
Cover of the book

2013 | OriginalPaper | Chapter

1. Research of Botnet Intrusion Detection Technology Based on the Flow

Author : Ling Jia

Published in: Informatics and Management Science IV

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In view of the current Botnet attack turning frequently, this paper analysis the double-stage propagation model of intelligent botnet, and puts forward a botnet detection method. This method adopts the concept of flow; for the first stage of the propagation, the paper puts forward the small flow filtering method, and reduces the number of flows needed to detect deeply effectively; for the second stage of the propagation, the paper adopts the thought of flow call-back, and detect each suspicious IP on the terminal router when botnet attacks cause network congestion, and then ensure the detection of botnet in real time.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dagon D (2006) Modeling botnet propagation using time zones. In: 13th annual network and distributed system security symposium, vol 328. San Diego, pp 235–249 Dagon D (2006) Modeling botnet propagation using time zones. In: 13th annual network and distributed system security symposium, vol 328. San Diego, pp 235–249
2.
go back to reference Provos NA (2004) Virtual honeypot framework. In: Proceedings of 13th USENIX security symposium, vol 293. San Diego, pp 127–131 Provos NA (2004) Virtual honeypot framework. In: Proceedings of 13th USENIX security symposium, vol 293. San Diego, pp 127–131
3.
go back to reference Zou C, Cunningham R (2007) Honeypot-aware advanced botnet construction and maintenance. In: The international conference on dependable systems and networks, vol 321, Philadelphia, pp 199–208 Zou C, Cunningham R (2007) Honeypot-aware advanced botnet construction and maintenance. In: The international conference on dependable systems and networks, vol 321, Philadelphia, pp 199–208
4.
go back to reference Ping L, Xun Y (2008) A network traffic classification algorithm based on flow statistical characteristics. J Beijing Univ Posts Telecommun 31(2), 23:15–19 Ping L, Xun Y (2008) A network traffic classification algorithm based on flow statistical characteristics. J Beijing Univ Posts Telecommun 31(2), 23:15–19
5.
go back to reference Mingjiang Y, Ke X, Jianping W (2009) Auto sig-automati-cally generating signatures for applications. In: IEEE international conference on computer and information technology, vol 234. Xiamen, pp 104–109 Mingjiang Y, Ke X, Jianping W (2009) Auto sig-automati-cally generating signatures for applications. In: IEEE international conference on computer and information technology, vol 234. Xiamen, pp 104–109
Metadata
Title
Research of Botnet Intrusion Detection Technology Based on the Flow
Author
Ling Jia
Copyright Year
2013
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-4793-0_1

Premium Partners