Detection of botnet by analyzing network traffic flow characteristics using open source tools | IEEE Conference Publication | IEEE Xplore

Detection of botnet by analyzing network traffic flow characteristics using open source tools


Abstract:

Botnets are emerging as the most serious cyber threat among different forms of malware. Today botnets have been facilitating to launch many cybercriminal activities like ...Show More

Abstract:

Botnets are emerging as the most serious cyber threat among different forms of malware. Today botnets have been facilitating to launch many cybercriminal activities like DDoS, click fraud, phishing attacks etc. The main purpose of botnet is to perform massive financial threat. Many large organizations, banks and social networks became the target of bot masters. Botnets can also be leased to motivate the cybercriminal activities. Recently several researches and many efforts have been carried out to detect bot, C&C channels and bot masters. Ultimately bot maters also strengthen their activities through sophisticated techniques. Many botnet detection techniques are based on payload analysis. Most of these techniques are inefficient for encrypted C&C channels. In this paper we explore different categories of botnet and propose a detection methodology to classify bot host from the normal host by analyzing traffic flow characteristics based on time intervals instead of payload inspection. Due to that it is possible to detect botnet activity even encrypted C&C channels are used.
Date of Conference: 09-10 January 2015
Date Added to IEEE Xplore: 01 October 2015
ISBN Information:
Conference Location: Coimbatore, India

Contact IEEE to Subscribe

References

References is not available for this document.