We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Enhanced Peer-to-Peer based Botnet Detection Method with Intrusion Free Network Scheme

by Megha Godage, A. A. Phatak, R. S. Dayama
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 4
Year of Publication: 2017
Authors: Megha Godage, A. A. Phatak, R. S. Dayama
10.5120/ijca2017915927

Megha Godage, A. A. Phatak, R. S. Dayama . Enhanced Peer-to-Peer based Botnet Detection Method with Intrusion Free Network Scheme. International Journal of Computer Applications. 179, 4 ( Dec 2017), 35-39. DOI=10.5120/ijca2017915927

@article{ 10.5120/ijca2017915927,
author = { Megha Godage, A. A. Phatak, R. S. Dayama },
title = { Enhanced Peer-to-Peer based Botnet Detection Method with Intrusion Free Network Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2017 },
volume = { 179 },
number = { 4 },
month = { Dec },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number4/28727-2017915927/ },
doi = { 10.5120/ijca2017915927 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:54:27.847121+05:30
%A Megha Godage
%A A. A. Phatak
%A R. S. Dayama
%T Enhanced Peer-to-Peer based Botnet Detection Method with Intrusion Free Network Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 4
%P 35-39
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Peer-to-Peer [P2P] networks usually has the ability to perform bidirectional communication efficiently, which means both the sending and receiving end has the same transactional power and ability to communicate with one and another. In the modern world, lots of misuses occurred via network schema; now-a-days, most of the malicious activities are held via this kind of P2P data sharing mechanisms, which are held by Botmasters. The botmasters acquire the usage of P2P network and utilize it for their own purposes and make this network to act like malicious one and took the effortness of others. Lots of existing approaches are available, but all are having certain limitations, so a new botnet detection scheme is required to resolve these issues and save the network from this kind of activities, which is called "Scalable Botnet Detection Mechanism". This Scalable Botnet Detection Mechanism initiates its first activity by means of finding the connected systems into the network and make the summary of it. The next step is to manipulate the profile-handling of P2P traffic-estimations as well as classify the P2P botnet traffic and legitimate P2P traffic. Simultaneously this system efficiently identifies the performance scenario of the P2P network and makes the system more scalable in further processing. The experimental results proves that our proposed approach is producing the result with more accuracy as well as more scalable than past schemes.

References
  1. J. Zhang, R. Perdisci, W. Lee, U. Sarfraz, and X. Luo, “Detecting stealthy P2P botnets using statistical traffic fingerprints,” in Proc. IEEE/IFIP 41st Int. Conf. DSN, Jun. 2011, pp. 121–132.
  2. S. Saad, I. Traore, A. Ghorbani, B. Sayed, D. Zhao, W. Lu, et al., “Detecting P2P botnets through network behavior analysis and machine learning,” in Proc. 9th Annu. Int. Conf. PST, Jul. 2011, pp. 174–180.
  3. D. Liu, Y. Li, Y. Hu, and Z. Liang, “A P2P-botnet detection model and algorithms based on network streams analysis,” in Proc. IEEE FITME, Oct. 2010, pp. 55–58.
  4. W. Liao and C. Chang, “Peer to peer botnet detection using data mining scheme,” in Proc. IEEE Int. Conf. ITA, Aug. 2010, pp. 1–4.
  5. T. Karagiannis, K. Papagiannaki, and M. Faloutsos, “BLINC: Multilevel traffic classification in the dark,” in Proc. ACM SIGCOMM, 2005, pp. 229–240.
  6. S. Sen, O. Spatscheck, and D. Wang, “Accurate, scalable in-network identification of P2P traffic using application signatures,” in Proc. 13th ACM Int. Conf. WWW, 2004, pp. 512–521.
  7. T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, “Transport layer identification of P2P traffic,” in Proc. 4th ACM SIGCOMM Conf. IMC, 2004, pp. 121–134.
  8. A. W. Moore and D. Zuev, “Internet traffic classification using Bayesian analysis techniques,” in Proc. ACM SIGMETRICS, 2005, pp. 50–60.
  9. M. P. Collins and M. K. Reiter, “Finding peer-to-peer file sharing using coarse network behaviors,” in Proc. 11th ESORICS, 2006, pp. 1–17.
  10. D. Stutzbach and R. Rejaie, “Understanding churn in peer-topeer networks,” in Proc. 6th ACM SIGCOMM Conf. IMC, 2006, pp. 189–202.
  11. T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling, “Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm,” in Proc. USENIX LEET, 2008, pp. 1–9.
  12. G. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin, “Estimating P2P traffic volume at USC,” USC/Information Sciences Institute, Los Angeles, CA, USA, Tech. Rep. ISI-TR-2007-645, 2007.
  13. T. Zhang, R. Ramakrishnan, and M. Livny, “BIRCH: An efficient data clustering method for very large databases,” in Proc. ACM SIGMOD, 1996, pp. 103–114.
  14. M. Halkidi, Y. Batistakis, and M. Vazirgiannis, “On clustering validation techniques,” J. Intell. Inf. Syst., vol. 17, nos. 2–3, pp. 107–145, 2001.
  15. (2011). Argus: Auditing Network Activity [Online]. Available: http://www.qosient.com/argus/
  16. Z.Li, A.Goyal, Y.Chen, and A.Kuzmanovic, “Measurement and diagnosis of address misconfigured P2P traffic,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9.
  17. (2011).Autoit Script [Online]. Available: http://www.autoitscript. com/autoit3/index.shtml
  18. (2011).Zeus Gets More Sophisticated Using P2P Techniques[Online].Available: http://www.abuse.ch/?p=3499
  19. A. Binzenhofer, D. Staehle, and R. Henjes, “On the stability of chordbased P2P systems,” in Proc. IEEE Global Telecommun. Conf., vol. 2. Nov./Dec. 2005, pp. 884–888.
  20. S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz, “Handling churn in a DHT,” in Proc. Annu. Conf. USENIX Annu. Tech. Conf., 2004, pp. 127–140.
Index Terms

Computer Science
Information Sciences

Keywords

Botnet Detection Scalable Botnet Detection Scheme Peer-to-Peer P2P Network Intrusion Avoidance Botnet Master.