【24h】

Botnet detection based on traffic monitoring

机译:基于流量监控的僵尸网络检测

获取原文

摘要

Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They are used to distribute commands to the Bots for malicious activities such as distributed denial-of-service (DDoS) attacks, spam and phishing. Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols (e.g., IRC,HTTP) and structures (e.g., centralized), and can become ineffective as Botnets change their structure and C&C techniques. In this paper, we proposed a new general detection framework. This proposed framework is based on finding similar communication patterns and behaviors among the group of hosts that are performing at least one malicious activity. The point that distinguishes our proposed detection framework from many other similar works is that there is no need for prior knowledge of Botnets such as Botnet signature.
机译:僵尸网络最为广泛,并且经常发生在当今的网络攻击中,从而对我们的网络资产和组织的财产造成严重威胁。僵尸网络是受感染计算机(僵尸计算机)的集合,受其破坏的计算机(发起人BotMaster)在通用的公共控制(C&C)基础结构下进行远程控制。它们用于向Bot分发命令以进行恶意活动,例如分布式拒绝服务(DDoS)攻击,垃圾邮件和网络钓鱼。大多数现有的僵尸网络检测方法仅专注于特定的僵尸网络命令和控制(C&C)协议(例如IRC,HTTP)和结构(例如集中式),并且随着僵尸网络改变其结构和C&C技术而变得无效。在本文中,我们提出了一个新的常规检测框架。该提出的框架基于在执行至少一个恶意活动的主机组之间发现相似的通信模式和行为。将我们提议的检测框架与许多其他类似作品区分开来的点是,无需像僵尸网络签名这样的僵尸网络先验知识。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号