2015 Annual IEEE India Conference (INDICON) 2015
DOI: 10.1109/indicon.2015.7443675
|View full text |Cite
|
Sign up to set email alerts
|

A novel HTTP botnet traffic detection method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The challenge of this approach is how to differentiate entropy produces by encrypted Botnet with other traffic that produces high entropy, for instance, media, executable, and compressed files. Tyagi et al (2015) [28] also implement deep packet inspection (DPI) in their approach and proposed N-gram based HTTP bot traffic detection. The proposed technique detects encrypted and regular Botnet.…”
Section: Related Workmentioning
confidence: 99%
“…The challenge of this approach is how to differentiate entropy produces by encrypted Botnet with other traffic that produces high entropy, for instance, media, executable, and compressed files. Tyagi et al (2015) [28] also implement deep packet inspection (DPI) in their approach and proposed N-gram based HTTP bot traffic detection. The proposed technique detects encrypted and regular Botnet.…”
Section: Related Workmentioning
confidence: 99%
“…The value of plus/minus 2 seconds is used to determine if a cell is close to the next as it is a fair interval to account for separate activities while making room for network lags especially in the case of chat protocols that could have constant cells. For example, [10,11,12,13,20,21,22,23,30,31,32,33] become [11.5, 21.5, 31.5]; the cells with timestamps 10, 11, 12 and 13 were clustered as a unique cell with timestamp 11.5 and a unique cell count of 4. Cell aggregation is done to group events together and ease the extraction of features.…”
Section: Cell Aggregation Grouping and Time Segregationmentioning
confidence: 99%
“…Botnets utilize Peer-to-Peer (P2P) networks, open file sharing frameworks, and even "hit lists" to detect vulnerable IP addresses for infection among many other network propagation methods [22]. Tyagi et al [23] focused on detecting periodicity of similar contents in a particular flow using N-Gram analysis and Deep Packet Inspection (DPI). The study clustered the similar flows and checked the similarity score using a distance metric.…”
Section: Malicious Botnet Detectionmentioning
confidence: 99%