Effective and Scalable Botnet Detection in Network Traffic

Effective and Scalable Botnet Detection in Network Traffic
Author :
Publisher :
Total Pages :
Release :
ISBN-10 : OCLC:825107560
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Effective and Scalable Botnet Detection in Network Traffic by : Junjie Zhang

Download or read book Effective and Scalable Botnet Detection in Network Traffic written by Junjie Zhang and published by . This book was released on 2012 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Botnets represent one of the most serious threats against Internet security since they serve as platforms that are responsible for the vast majority of large-scale and coordinated cyber attacks, such as distributed denial of service, spamming, and information stolen. Detecting botnets is therefore of great importance and a number of network-based botnet detection systems have been proposed. However, as botnets perform attacks in an increasingly stealthy way and the volume of network traffic is rapidly growing, existing botnet detection systems are faced with significant challenges in terms of effectiveness and scalability. The objective of this dissertation is to build novel network-based solutions that can boost both the effectiveness of existing botnet detection systems by detecting botnets whose attacks are very hard to be observed in network traffic, and their scalability by adaptively sampling network packets that are likely to be generated by botnets. To be specific, this dissertation describes three unique contributions. First, we built a new system to detect drive-by download attacks, which represent one of the most significant and popular methods for botnet infection. The goal of our system is to boost the effectiveness of existing drive-by download detection systems by detecting a large number of drive-by download attacks that are missed by these existing detection efforts. Second, we built a new system to detect botnets with peer-to-peer (P2P) command & control (C & C) structures (i.e., P2P botnets), where P2P C & Cs represent currently the most robust C & C structures against disruption efforts. Our system aims to boost the effectiveness of existing P2P botnet detection by detecting P2P botnets in two challenging scenarios: i) botnets perform stealthy attacks that are extremely hard to be observed in the network traffic; ii) bot-infected hosts are also running legitimate P2P applications (e.g., Bittorrent and Skype). Finally, we built a novel traffic analysis framework to boost the scalability of existing botnet detection systems. Our framework can effectively and efficiently identify a small percentage of hosts that are likely to be bots, and then forward network traffic associated with these hosts to existing detection systems for fine-grained analysis, thereby boosting the scalability of existing detection systems. Our traffic analysis framework includes a novel botnet-aware and adaptive packet sampling algorithm, and a scalable flow-correlation technique.


Effective and Scalable Botnet Detection in Network Traffic Related Books

Effective and Scalable Botnet Detection in Network Traffic
Language: en
Pages:
Authors: Junjie Zhang
Categories: Computer networks
Type: BOOK - Published: 2012 - Publisher:

DOWNLOAD EBOOK

Botnets represent one of the most serious threats against Internet security since they serve as platforms that are responsible for the vast majority of large-sc
Botnet Detection
Language: en
Pages: 178
Authors: Wenke Lee
Categories: Computers
Type: BOOK - Published: 2007-10-23 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate
Scalable Techniques for Anomaly Detection
Language: en
Pages:
Authors: Sandeep Yadav
Categories:
Type: BOOK - Published: 2013 - Publisher:

DOWNLOAD EBOOK

Computer networks are constantly being attacked by malicious entities for various reasons. Network based attacks include but are not limited to, Distributed Den
Cybercrime and Espionage
Language: en
Pages: 270
Authors: Will Gragido
Categories: Computers
Type: BOOK - Published: 2011-01-07 - Publisher: Newnes

DOWNLOAD EBOOK

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cyber
Detecting Botnet Traffic Using Machine Learning
Language: en
Pages: 56
Authors: Pallavi Vardhamane
Categories:
Type: BOOK - Published: 2017 - Publisher:

DOWNLOAD EBOOK

Over the past few years, many cybersecurity incidents were reported worldwide through distributed denial of service attacks. Many of these attacks were conducte