Peer to Peer Botnet Detection Based on Flow Intervals - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Peer to Peer Botnet Detection Based on Flow Intervals

Ali Ghorbani
  • Fonction : Auteur
  • PersonId : 1007477
Wei Lu
  • Fonction : Auteur
  • PersonId : 1007480

Résumé

Botnets are becoming the predominant threat on the Internet today and is the primary vector for carrying out attacks against organizations and individuals. Botnets have been used in a variety of cybercrime, from click-fraud to DDOS attacks to the generation of spam. In this paper we propose an approach to detect botnet activity by classifying network traffic behavior using machine learning classification techniques. We study the feasibility of detecting botnet activity without having seen a complete network flow by classifying behavior based on time intervals and we examine the performance of two popular classification techniques with respect to this data. Using existing datasets, we show experimentally that it is possible to identify the presence of botnet activity with high accuracy even with very small time windows, though there are some limitations to the approach based on the selection of attributes.
Fichier principal
Vignette du fichier
978-3-642-30436-1_8_Chapter.pdf (660.29 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01518229 , version 1 (04-05-2017)

Licence

Paternité

Identifiants

Citer

David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, et al.. Peer to Peer Botnet Detection Based on Flow Intervals. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.87-102, ⟨10.1007/978-3-642-30436-1_8⟩. ⟨hal-01518229⟩
89 Consultations
130 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More