2017 25th European Signal Processing Conference (EUSIPCO) 2017
DOI: 10.23919/eusipco.2017.8081594
|View full text |Cite
|
Sign up to set email alerts
|

Botnet identification in multi-clustered DDoS attacks

Abstract: Abstract-In a randomized DDoS attack with increasing emulation dictionary, the bots try to hide their malicious activity by disguising their traffic patterns as "normal" traffic patterns. In this work, we extend the DDoS class introduced in [1], [2] to the case of a multi-clustered botnet, whose main feature is that the emulation dictionary is split over the botnet, giving rise to multiple botnet clusters. We propose two strategies to identify the botnet in such challenging scenario, one based on cluster expur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…The aim of this section is to show that the BotClusterBuster algorithm proposed in [22] can identify consistently the botnet clusters hidden in the network. The core of such algorithm is a pairwise comparison between a pivot element (a single node or an estimated botnet) and a test node.…”
Section: Botnet Identification Algorithmmentioning
confidence: 99%
“…The aim of this section is to show that the BotClusterBuster algorithm proposed in [22] can identify consistently the botnet clusters hidden in the network. The core of such algorithm is a pairwise comparison between a pivot element (a single node or an estimated botnet) and a test node.…”
Section: Botnet Identification Algorithmmentioning
confidence: 99%
“…One‐to‐many data sharing has been achieved successfully with attribute‐based encryption (ABE), that thought to be the most promising approach. In addition, it also offers fine‐grained access control, 11 Any user could recover a cipher text using the identity‐based encryption method known as ABE if and only if they possessed the set of attributes designated by the data's owner 2,12 . ABE technique has been closely examined as a one‐to‐many cryptographic solution for offering fine‐grained access control capability, ensuring the security of outsourced data while also allowing flexible access policy 13,14 …”
Section: Introductionmentioning
confidence: 99%
“…In addition, it also offers fine-grained access control, 11 Any user could recover a cipher text using the identity-based encryption method known as ABE if and only if they possessed the set of attributes designated by the data's owner. 2,12 ABE technique has been closely examined as a one-to-many cryptographic solution for offering fine-grained access control capability, ensuring the security of outsourced data while also allowing flexible access policy. 13,14 The Medical IoT uses a secure fog-cloud architecture to protect the resources of these devices while ensuring the confidentiality of medical data.…”
mentioning
confidence: 99%
“…The most challenging issues of WSN are energy efficiency, appropriate CH selection and secure data delivery. The secure and fair CH selection protocol aids in achieving classification and attacker identification [14, 10]. Clustering is considered as an effective and scalable technique in WSN [15, 16].…”
Section: Introductionmentioning
confidence: 99%