2017
DOI: 10.11601/ijates.v6i1.205
|View full text |Cite
|
Sign up to set email alerts
|

Botnet C&C Traffic and Flow Lifespans Using Survival Analysis

Abstract: Abstract-This paper addresses the issue of detecting unwanted traffic in data networks, namely the detection of botnet networks. In this paper, we focused on a time behavioral analysis, more specifically said -lifespans of a simulated botnet network traffic, collected and discovered from NetFlow messages, and also of real botnet communication of a malware.As a method we chose survival analysis and for rigorous testing of differences Mantel-Cox test. Lifespans of those referred traffics are discovered and calcu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 5 publications
(7 reference statements)
0
7
0
Order By: Relevance
“…Oujezsky et al analyzed botnet's behavior to extract lifespans of C&C communication. The dataset includes real world and simulated botnet traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Oujezsky et al analyzed botnet's behavior to extract lifespans of C&C communication. The dataset includes real world and simulated botnet traffic.…”
Section: Related Workmentioning
confidence: 99%
“…To achieve this objective, they usually plant some form of a backdoor or create a C&C channel to allow them to re-enter the system at will [26]. C&C activity is initiated when an attacker compromises an end-user device and transforms that device into a bot that listens out for instructions issued by the botmaster [8], [26].…”
Section: Malware Command and Controlmentioning
confidence: 99%
“…Cyber-criminals like to maintain control of devices and hosts they compromise for long term benefits such as financial gain [16]. To achieve this objective, they usually plant some form of a backdoor or create a C&C channel to allow them to re-enter the system at will [26]. C&C activity is initiated when an attacker compromises an end-user device and transforms that device into a bot that listens out for instructions issued by the botmaster [8], [26].…”
Section: Malware Command and Controlmentioning
confidence: 99%
“…To achieve this objective, they usually plant some form of a backdoor or create a C&C channel to allow them to re-enter the system at will [26]. C&C activity is initiated when an attacker compromises an end-user device and transforms that device into a bot that listens out for instructions issued by the botmaster [8], [26]. Norton defines a bot as "a type of malware that allows an attacker to take control over an affected computer" [23].…”
Section: Malware Command and Controlmentioning
confidence: 99%
See 1 more Smart Citation