2015 IEEE 13th International Conference on Industrial Informatics (INDIN) 2015
DOI: 10.1109/indin.2015.7281975
|View full text |Cite
|
Sign up to set email alerts
|

Botnet detection within cloud service provider networks using flow protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Count Based Filtering (D3) [38] Hop count and request frequency thresholds [34] TTL matching to detect IP spoofing [44] Request threshold for a human in unit time [71] Threshold on number of connections by a source [57] TTL probing to find genuine TTLs [42] Request count threshold by each source BotCloud Detection (D4) [72] Network/VMM checks to find attack VMs [73] CSP driven attack flow check and source trace [74] Bot detection in VMs using NetFlow [75] Hypervisor led collaborative egress detection [76] Virtual Machine Introspection (VMI)…”
Section: Source and Spoof Trace (D2)mentioning
confidence: 99%
See 1 more Smart Citation
“…Count Based Filtering (D3) [38] Hop count and request frequency thresholds [34] TTL matching to detect IP spoofing [44] Request threshold for a human in unit time [71] Threshold on number of connections by a source [57] TTL probing to find genuine TTLs [42] Request count threshold by each source BotCloud Detection (D4) [72] Network/VMM checks to find attack VMs [73] CSP driven attack flow check and source trace [74] Bot detection in VMs using NetFlow [75] Hypervisor led collaborative egress detection [76] Virtual Machine Introspection (VMI)…”
Section: Source and Spoof Trace (D2)mentioning
confidence: 99%
“…Authors in [73] provide a solution where the cloud provider checks the traffic flow and perform the anomaly detection using source traceback techniques at the network. Authors in [74] provide a solution based on SDN approaches using Bot detection with the help of NetFlow protocol. Hypervisor based checks are used to detect the vulnerabilities in the guest VMs in [75] where collaborative egress detection technique is employed.…”
Section: Botcloud Detection (D4)mentioning
confidence: 99%
“…Graham et al [38] experimented on how flow export could be used to capture network traffic parameters for identifying C&C server within a virtual machine of a cloud platform. They used NetFlow exported from virtual switches to detect C&C botnets within virtualized infrastructures.…”
Section: Network-based and Flow-based Botnet Detectionmentioning
confidence: 99%