首页> 外文期刊>Peer-to-peer networking and applications >A novel method of mining network flow to detect P2P botnets - Springer
【24h】

A novel method of mining network flow to detect P2P botnets - Springer

机译:一种挖掘网络流量以检测P2P僵尸网络的新方法-Springer

获取原文
获取原文并翻译 | 示例
       

摘要

Botnets are a serious threat to cyber-security. As a consequence, botnet detection has become an important research topic in network protection and cyber-crime prevention. P2P botnets are one of the most malicious zombie networks, as their architecture imitates P2P software. Characteristics of P2P botnets include (1) the use of multiple controllers to avoid single-point failure; (2) the use of encryption to evade misuse detection technologies; and (3) the capacity to evade anomaly detection, usually by initiating numerous sessions without consuming substantial bandwidth. To overcome these difficulties, we propose a novel data mining method. First, we identify the differences between P2P botnet behavior and normal network behavior. Then, we use these differences to tune the data-mining parameters to cluster and distinguish normal Internet behavior from that lurking P2P botnets. This method can identify a P2P botnet without breaking the encryption. Furthermore, the detection system can be deployed without altering the existing network architecture, and it can detect the existence of botnets in a complex traffic mix before they attack. The experimental results reveal that the method is effective in recognizing the existence of botnets. Accordingly, the results of this study will be of value to information security academics and practitioners.
机译:僵尸网络是对网络安全的严重威胁。因此,僵尸网络检测已成为网络保护和网络犯罪预防中的重要研究课题。 P2P僵尸网络是最恶意的僵尸网络之一,因为其架构模仿了P2P软件。 P2P僵尸网络的特征包括:(1)使用多个控制器以避免单点故障; (2)使用加密来规避滥用检测技术; (3)规避异常检测的能力,通常是通过启动大量会话而不消耗大量带宽来实现的。为了克服这些困难,我们提出了一种新颖的数据挖掘方法。首先,我们确定P2P僵尸网络行为与正常网络行为之间的区别。然后,我们利用这些差异来调整数据挖掘参数以进行聚类,并将正常的互联网行为与潜伏的P2P僵尸网络区分开。这种方法可以识别P2P僵尸网络而不会破坏加密。此外,可以在不更改现有网络体系结构的情况下部署检测系统,并且可以在攻击之前在复杂的流量组合中检测到僵尸网络的存在。实验结果表明,该方法可有效识别僵尸网络的存在。因此,这项研究的结果将对信息安全学者和从业者有价值。

著录项

  • 来源
    《Peer-to-peer networking and applications》 |2014年第4期|645-654|共10页
  • 作者单位

    1.Department of Information Management College of Management Tatung University No.40 Sec. 3 Jhongshan N. Rd. Taipei 104 Taiwan Republic of China;

    1.Department of Information Management College of Management Tatung University No.40 Sec. 3 Jhongshan N. Rd. Taipei 104 Taiwan Republic of China;

    2.Chunghwa Telecom Co Taipei Republic of China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Data mining P2P Communication Botnet;

    机译:数据挖掘P2P通信僵尸网络;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号