2011
DOI: 10.1016/j.comnet.2011.05.026
|View full text |Cite
|
Sign up to set email alerts
|

A fuzzy pattern-based filtering algorithm for botnet detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 69 publications
(57 citation statements)
references
References 6 publications
0
57
0
Order By: Relevance
“…A bot's activity behavior. [30]. Therefore, the detection rates are improved and the error rates are reduced significantly.…”
Section: Related Workmentioning
confidence: 94%
See 2 more Smart Citations
“…A bot's activity behavior. [30]. Therefore, the detection rates are improved and the error rates are reduced significantly.…”
Section: Related Workmentioning
confidence: 94%
“…However, these approaches take longer to filter a packet set captured off a giga-bit network interface than it took the set to arrive, making them infeasible for realtime traffic reduction. Therefore, we integrate GPU based packet filtering approach [13] into botnet detection tool [30] to enhance the performance of the tool. Figure 2 shows the proposed architecture.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the signature generation is based on the extraction of frequent communication patterns, it is also not applicable to encrypted communication. Wang et al proposed a fuzzy pattern-based filtering algorithm [23]. This algorithm depends on the DNS query patterns, so that the botnet, especially for the Web-based botnet, can easily avoid the filtering by directly using IP address to communicate.…”
Section: Related Workmentioning
confidence: 99%
“…They also discover that some of these bots generate a large number of destination unreachable error messages (DU) and connection reset error messages while trying to connect to other peers. Wang [6] explain some of the features and challenges when dealing with the Nugache P2P botnet. Hammadi [7] conclude that there is no static IDS that will detect Nugache traffic.…”
Section: Introductionmentioning
confidence: 99%