2014
DOI: 10.1007/978-3-319-06320-1_7
|View full text |Cite
|
Sign up to set email alerts
|

A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The authors incorporate spatial and temporal correlations to identify patterns of the social bots. They gathered source code, builders, and execution patterns from established social botnets, including Twitterbot (Singh [22]), Twebot (Burghouwt et al [23]), Yazanbot (Boshmaf et al [24]), Nazbot (Kartaltepe et al [11]), wbbot (Ji et al [25]), and fbbot. Their objective was to scrutinize the techniques these bots employ to bypass current detection systems.…”
Section: Ml-based Detectionmentioning
confidence: 99%
“…The authors incorporate spatial and temporal correlations to identify patterns of the social bots. They gathered source code, builders, and execution patterns from established social botnets, including Twitterbot (Singh [22]), Twebot (Burghouwt et al [23]), Yazanbot (Boshmaf et al [24]), Nazbot (Kartaltepe et al [11]), wbbot (Ji et al [25]), and fbbot. Their objective was to scrutinize the techniques these bots employ to bypass current detection systems.…”
Section: Ml-based Detectionmentioning
confidence: 99%
“…Ji et al [117] conducted an empirical evaluation of several previously documented abusive social bots. They collected source codes, builders, and execution traces of existing social botnets, such as Twitterbot (Singh [120]), Twebot (Burghouwt et al [121]), Yazanbot (Boshmaf et al [122]), Nazbot (Kartaltepe et al [32]), wbbot (Ji et al [123]), and fbbot. Their aim was to analyze the mechanisms these bots utilize to evade existing detection approaches.…”
Section: Abuse Detection Mechanismmentioning
confidence: 99%
“…and has seen multiple uses in the wild over the years [15]. As we mentioned in Section 1, a rather rich academic literature explores variants of this idea: initially to thwart signature scanning [39], but soon enough behavioral detection became the main target (e.g., [26,21,15]). Multi-process execution can be effective against behavioral analyses as their "dynamic" signatures often involve sequences of events that are not short (or the risk of false positives could be very high [26]): henceforth attackers may spread smaller parts to separate execution units.…”
Section: Distributed Malwarementioning
confidence: 99%
“…This approach requires partitioning a payload into coordinated components so that no one of them causes an AV/EDR system to raise an alert [40]. Some academic literature [40,26,21,8] explores distributed malware execution designs that, using manual or automated methods, craft components that execute as independent processes and coordinate between themselves, possibly through covert channels. Using dedicated processes as units, however, is a conspicuous trait that exposes every process to immediate analysis and, depending on the ignition method, to correlation attempts from security solutions.…”
Section: Introductionmentioning
confidence: 99%