2010 IEEE International Conference on Communications 2010
DOI: 10.1109/icc.2010.5502092
|View full text |Cite
|
Sign up to set email alerts
|

A Novel IRC Botnet Detection Method Based on Packet Size Sequence

Abstract: Botnets have become a serious threat to Internet and are often deployed to control a large pool of zombies and perform notorious activities such as DDoS, information theft and spam sending. In this paper, a new method is developed for detecting IRC botnets by analyzing the characteristic of packet size sequence of the TCP conversation between IRC zombies and their command and control (C&C) servers. In comparison with IRC chat, the TCP conversations within IRC botnets show a nature of approximate periodicity de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0
1

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 14 publications
(13 reference statements)
0
11
0
1
Order By: Relevance
“…The false alarm rate of normal traffic for thresholds 4, 5, 6, 7 and 8 is 1%. In this experiment, we use different thresholds (1,2,3,4,5,6,7,8) to identify internet traffic. The results are shown in Figure 16, i.e., when the threshold reaches 3, the detection rate drops rapidly.…”
Section: Detection Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The false alarm rate of normal traffic for thresholds 4, 5, 6, 7 and 8 is 1%. In this experiment, we use different thresholds (1,2,3,4,5,6,7,8) to identify internet traffic. The results are shown in Figure 16, i.e., when the threshold reaches 3, the detection rate drops rapidly.…”
Section: Detection Results and Discussionmentioning
confidence: 99%
“…Compared to other malware programs which are being used to perform malicious conduct exclusively, a botnet functions as a gathering of contaminated hosts dependent on the C & C correspondence channel. A botnets system can be ordered into two principal classes dependent on the C & C foundation: brought together and decentralized C & C [3]. In incorporated botnets, the botmaster typically utilizes the C…”
Section: Introductionmentioning
confidence: 99%
“…The IRC applications are then analyzed using temporal-frequent characteristics of flows to discriminate malicious IRC channels created by bots from legitimate IRC traffic. Ma et al [117] detect botnets from characteristics of packet size sequences of TCP conversations between zombies and their C&C servers. An approximate periodicity known as quasi-periodicity is observed in IRC botnet conversations.…”
Section: ) Botnet Attack Detection: Approaches and Methodsmentioning
confidence: 99%
“…There are so many botnet detection techniques and tools are used worldwide in the literature. The general structure of botnet detection techniques are classified into two broad categories, IDSs and HoneyNets [12]. A honeynet is used to collect information from bots for further analysis to measure the intensity and vulnerability of the attack [9].…”
Section: Introductionmentioning
confidence: 99%