CFP last date
20 December 2024
Reseach Article

Detection Approach for Botnets with Cross Cluster Correlation

by V. Maruthi Prasad, K. Surekha, G. Naga Swetha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 44
Year of Publication: 2019
Authors: V. Maruthi Prasad, K. Surekha, G. Naga Swetha
10.5120/ijca2019919309

V. Maruthi Prasad, K. Surekha, G. Naga Swetha . Detection Approach for Botnets with Cross Cluster Correlation. International Journal of Computer Applications. 178, 44 ( Aug 2019), 42-45. DOI=10.5120/ijca2019919309

@article{ 10.5120/ijca2019919309,
author = { V. Maruthi Prasad, K. Surekha, G. Naga Swetha },
title = { Detection Approach for Botnets with Cross Cluster Correlation },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2019 },
volume = { 178 },
number = { 44 },
month = { Aug },
year = { 2019 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number44/30838-2019919309/ },
doi = { 10.5120/ijca2019919309 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:53:07.360602+05:30
%A V. Maruthi Prasad
%A K. Surekha
%A G. Naga Swetha
%T Detection Approach for Botnets with Cross Cluster Correlation
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 44
%P 42-45
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Botnets are presently the key stage for some Internet assaults, for example, spam, dispersed foreswearing of-benefit (DDoS), fraud, and phishing. The vast majority of the current botnet identification approaches work just on particular botnet order and control (C&C) conventions (e.g., IRC) and structures (e.g., brought together), and can progress toward becoming insufficient as botnets change their C&C strategies. In this paper, we present a general identification structure that is autonomous of botnet C&C convention and structure, what's more, requires no from the earlier information of botnets, (for example, caught bot parallels and henceforth the botnet marks, what's more, C&C server names/addresses). We begin from the definition and fundamental properties of botnets. We characterize a botnet as an organized gathering of malware occurrences that are controlled by means of C&C correspondence channels. The fundamental properties of a botnet are that the bots speak with some C&C servers/peers, perform malevolent exercises, and do as such in a comparative or related way. As needs be, our identification system groups comparative correspondence activity and comparative malevolent movement, and performs cross group connection to recognize the hosts that offer both comparative correspondence designs also, comparable vindictive movement designs. These hosts are in this way bots in the checked system. We have actualized our BotMiner model framework and assessed it utilizing numerous genuine system follows. The outcomes demonstrate that it can recognize certifiable botnets (IRC-based, HTTP-based, and P2P botnets including Nugache and Tempest worm), and has a low false positive rate.

References
  1. E. Alomari, “Botnet-based Distributed Denial of Service ( DDoS ) Attacks on Web Servers : Classification and Art,” vol. 49, no. 7, pp. 24–32, 2012.
  2. M. Thapliyal, N. Garg, and A. Bijalwan, “Botnet Forensics : Survey and Research Challenges,” no. April, 2013.
  3. F. Carpine and S. Maria, “Online IRC Botnet Detection using a SOINN Classifier,” pp. 1351–1356, 2013.
  4. R. A. Rodr, I. Omez, G. M. A-fern, and P. Garc, “Survey and Taxonomy of Botnet Research through Life-Cycle,” vol. 45, no. 4, 2013.
  5. I. Ullah, N. Khan, and H. a. Aboalsamh, “Survey on botnet: Its architecture, detection, prevention and mitigation,” 2013 10th IEEE Int. Conf. NETWORKING, Sens. Control, pp. 660–665, Apr. 2013.
  6. S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, “Botnets: A survey,” Comput. Networks, vol. 57, no. 2, pp. 378– 403, Feb. 2013.
  7. “Botnets The New Threat Landscape White Paper [Threat Control] - Cisco Systems.” .
  8. M. Zahid, A. Belmekki, and A. Mezrioui, “A new architecture for detecting DDoS/brute forcing attack and destroying the botnet behind,” 2012 Int. Conf. Multimed. Comput. Syst., pp. 899–903, May 2012.
  9. W. Paper, “Anatomy of a Botnet.” “Microsoft Security Intelligence Report,” vol. 15, 2013. W. Xianghua and C. Lijun, “Analysis and Design of Botnet Detection System,” 2012 Int. Conf. Comput. Sci. Serv. Syst., pp. 947–950, Aug. 2012
Index Terms

Computer Science
Information Sciences

Keywords

Command and Control Systems Botnet Botmaster