Skip to main content
Erschienen in: Wireless Personal Communications 4/2018

03.02.2018

Multi Attribute Real Time Traffic Inference Algorithm for Botnet Detection in Mobile Ad Hoc Network

verfasst von: G. Kavitha

Erschienen in: Wireless Personal Communications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The issue of botnet detection has been talked about in a few articles and there are number of techniques has been examined before. The earlier discussed methods handle the botnet detection in stable/unstable networks with little proximity and produces more false results. To overcome the problem of botnet detection in unstable mobile ad hoc network with dynamic addressing schemes, we propose a multi attribute real time traffic inference model algorithm to perform botnet detection. The method sticks to the basics of unstable network conditions and with the restriction of storage scalability. With this limitation, the nodes maintain small set of trace about the earlier transmission and the node details participated in the transmission. Upon receiving the packets from the neighbor node, the method extracts the features from the packet and performs traffic inference performed based on the other routes available to reach the destination. Also, the method identifies the hop details to identify the presence of botnet. Based on both the results the method eliminates the botnet from the network to improve the performance of the network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ji, Y., He, Y., Zhu, D., Li, Q., & Guo, D. (2014). A multiprocess mechanism of evading behavior-based bot detection approaches. Information Security Practice and Experience, 8434, 75–89.CrossRef Ji, Y., He, Y., Zhu, D., Li, Q., & Guo, D. (2014). A multiprocess mechanism of evading behavior-based bot detection approaches. Information Security Practice and Experience, 8434, 75–89.CrossRef
2.
Zurück zum Zitat Karim, A., Salleh, R. B., Shiraz, M., Shah, S. A. A., Awan, I., & Anuar, N. B. (2014). Botnet detection techniques: review, future trends, and issues. Journal of Zhejiang University Science, 15(11), 943–983.CrossRef Karim, A., Salleh, R. B., Shiraz, M., Shah, S. A. A., Awan, I., & Anuar, N. B. (2014). Botnet detection techniques: review, future trends, and issues. Journal of Zhejiang University Science, 15(11), 943–983.CrossRef
3.
Zurück zum Zitat Nagaraja, S. (2014). Botyacc: Unified P2P botnet detection using behavioural analysis and graph analysis. Computer Security—ESORICS 2014 Lecture Notes in Computer Science, 8713, 439–456. Nagaraja, S. (2014). Botyacc: Unified P2P botnet detection using behavioural analysis and graph analysis. Computer Security—ESORICS 2014 Lecture Notes in Computer Science, 8713, 439–456.
4.
Zurück zum Zitat Haddadi, F., Le Cong, D., Porter, L., & Zincir-Heywood, A. N. (2015). On the effectiveness of different botnet detection approaches. Information Security Practice and Experience Lecture Notes in Computer Science, 9065, 121–135.CrossRef Haddadi, F., Le Cong, D., Porter, L., & Zincir-Heywood, A. N. (2015). On the effectiveness of different botnet detection approaches. Information Security Practice and Experience Lecture Notes in Computer Science, 9065, 121–135.CrossRef
5.
Zurück zum Zitat Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., & Nicheporuk, A. (2014). A technique for detection of bots which are using polymorphic code. Computer Networks Communications in Computer and Information Science, 431, 265–276.CrossRef Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., & Nicheporuk, A. (2014). A technique for detection of bots which are using polymorphic code. Computer Networks Communications in Computer and Information Science, 431, 265–276.CrossRef
6.
Zurück zum Zitat Narang, P., Hota, C., & Venkatakrishnan, V. N. (2014). PeerShark: Flow-clustering and conversation-generation for malicious peer-to-peer traffic identification. EURASIP Journal on Information security, 2014, 15.CrossRef Narang, P., Hota, C., & Venkatakrishnan, V. N. (2014). PeerShark: Flow-clustering and conversation-generation for malicious peer-to-peer traffic identification. EURASIP Journal on Information security, 2014, 15.CrossRef
7.
Zurück zum Zitat Garg, S., Sarje, A. K., & Peddoju, S. K. (2014). Improved detection of P2P botnets through network behavior analysis. Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science, 420, 334–345. Garg, S., Sarje, A. K., & Peddoju, S. K. (2014). Improved detection of P2P botnets through network behavior analysis. Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science, 420, 334–345.
8.
Zurück zum Zitat Schiavoni, S., Maggi, F., Cavallaro, L., & Zanero, S. (2014). Phoenix: DGA-based botnet tracking and intelligence. Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science, 8550, 192–211. Schiavoni, S., Maggi, F., Cavallaro, L., & Zanero, S. (2014). Phoenix: DGA-based botnet tracking and intelligence. Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science, 8550, 192–211.
9.
Zurück zum Zitat Chanda, K. (2014). Hybrid botnet detection mechanism. International Journal of Computer Applications, 91(5), 12–16.CrossRef Chanda, K. (2014). Hybrid botnet detection mechanism. International Journal of Computer Applications, 91(5), 12–16.CrossRef
10.
Zurück zum Zitat Zeidanloo, H. R., & Manaf, A. B. A. (2010). Botnet detection by monitoring similar communication patterns (IJCSIS). International Journal of Computer Science and Information Security, 7(3), 36–45. Zeidanloo, H. R., & Manaf, A. B. A. (2010). Botnet detection by monitoring similar communication patterns (IJCSIS). International Journal of Computer Science and Information Security, 7(3), 36–45.
11.
Zurück zum Zitat Tyagi, A. K., & Nayeem, S. (2012). Detecting HTTP botnet using artificial immune system (AIS). International Journal of Applied Information Systems, 2(6), 34–37. Tyagi, A. K., & Nayeem, S. (2012). Detecting HTTP botnet using artificial immune system (AIS). International Journal of Applied Information Systems, 2(6), 34–37.
12.
Zurück zum Zitat Zeidanloo, H. R., Manaf, A. B. T., Vahdani, P., Tabatabaei, F., & Zamani, M. (2010). Botnet detection based on traffic monitoring. In International Conference on Networking and Information Technology (pp. 97–101). IEEE. Zeidanloo, H. R., Manaf, A. B. T., Vahdani, P., Tabatabaei, F., & Zamani, M. (2010). Botnet detection based on traffic monitoring. In International Conference on Networking and Information Technology (pp. 97–101). IEEE.
13.
Zurück zum Zitat Zeidanloo, H. R., & Abdul Manaf, A. B. T. (2010). A proposed framework for P2P Botnet detection. IACSIT International Journal of Engineering and Technology, 2(2), 161–168. Zeidanloo, H. R., & Abdul Manaf, A. B. T. (2010). A proposed framework for P2P Botnet detection. IACSIT International Journal of Engineering and Technology, 2(2), 161–168.
Metadaten
Titel
Multi Attribute Real Time Traffic Inference Algorithm for Botnet Detection in Mobile Ad Hoc Network
verfasst von
G. Kavitha
Publikationsdatum
03.02.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5384-3

Weitere Artikel der Ausgabe 4/2018

Wireless Personal Communications 4/2018 Zur Ausgabe

Neuer Inhalt