2012 International Conference on Multimedia Computing and Systems 2012
DOI: 10.1109/icmcs.2012.6320256
|View full text |Cite
|
Sign up to set email alerts
|

A new architecture for detecting DDoS/brute forcing attack and destroying the botnet behind

Abstract: Distributed Denial of Service (DDoS) attacks using Botnets became widely used in the Internet because of its efficiency and easy implementation. We will present in this paper a new architecture that stops DDoS attacks based on Botnet C&C (Command & control) and identify the Botmaster (the bots owner) machine. Unlike the researches done in the attack trace-back algorithms, the aim of this architecture is not only to determine the Internet Relay Chat (IRC) servers used to control the Botnet. But also to remove t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Many researches were done for detecting DDoS or fighting against them by providing new architectures and algorithms like probabilistic packet marking algorithm that allows detecting the attack source [4] and the architecture that detects the DDoS/Brute forcing attacks for destroying the Botnet behind [5]. However, researchers have to implement a big…”
Section: The Existing Test Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Many researches were done for detecting DDoS or fighting against them by providing new architectures and algorithms like probabilistic packet marking algorithm that allows detecting the attack source [4] and the architecture that detects the DDoS/Brute forcing attacks for destroying the Botnet behind [5]. However, researchers have to implement a big…”
Section: The Existing Test Methodsmentioning
confidence: 99%
“…For studying the Botnet attacks behavior and fight against them, researchers need huge resources in terms of machines and network equipments in order to establish the real word conditions. Those conditions can help when testing algorithms like detections and trace-back ones [4] [5]. For that, five basic requirements that emulation/simulation tool should provide was defined:…”
Section: Introductionmentioning
confidence: 99%
“…Accordingly, the posterior probability of class C for a given sample with k features is shown in Eq. (4).…”
Section: B: Naive Bayes (Nb)mentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Jiafeng Xie. denial of service malicious behavior [4], phishing [5] and scanning attacks [6].…”
Section: Introductionmentioning
confidence: 99%
“…Botmaster can perform distinctive sort of cybercrime like DDoS, click misrepresentation, phishing extortion, key logging, bit coins' extortion, spamming, sniffing traffic, spreading new malware, google AdSense maltreatment with bots [6]. These days the botnet is turning into the base of all cybercrime which is performed through the internet [7] [8]. Botmaster utilize distinctive strategies to contaminate a client gadget to make it bot (zombie) like drive by download, email and pilfered programming's are the most well-known method for attacks [9][10].…”
Section: Introductionmentioning
confidence: 99%