2011 IEEE International Conference on Computer Science and Automation Engineering 2011
DOI: 10.1109/csae.2011.5953166
|View full text |Cite
|
Sign up to set email alerts
|

Construction P2P firewall HTTP-Botnet defense mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Although, the proposed method can detect small-scale botnets, as noted by the authorsbot-masters can employevasion techniques like random delay in similar connections or random packet number that result in generating high false positive and false negative in results. In addition, like [13,16,21,22], normal programs which generates periodic connections (e.g. auto refresh web pages) can be detected as a Bot and increase the number of false positive.…”
Section: Regular Connection From Bot Infected Computers Tomentioning
confidence: 99%
“…Although, the proposed method can detect small-scale botnets, as noted by the authorsbot-masters can employevasion techniques like random delay in similar connections or random packet number that result in generating high false positive and false negative in results. In addition, like [13,16,21,22], normal programs which generates periodic connections (e.g. auto refresh web pages) can be detected as a Bot and increase the number of false positive.…”
Section: Regular Connection From Bot Infected Computers Tomentioning
confidence: 99%
“…When an IRC bot connects to a specific channel, it stays in the connected state, also known as the PUSH approach (Gu et al, 2008a). • HTTP botnet (Zargar et al, 2013): HTTP botnets use HTTP protocol for C&C communication and to control the bots (Koo et al, 2011). HTTP botnet C&C server works just like a normal web server and the bot works just like a normal web client.…”
Section: Botnet Communicationsmentioning
confidence: 99%
“…The distinct P2P botnets across multiple hidden bots server will be identifying using multivariate statistical measurement in particular time slot. The botnets evolvement as clarified by [2], [8] on application based can be simplified as Table I. So in near future, the combination of HTTP and P2P protocols used botnets known as hybrid P2P botnets may be arise with stronger asymmetric cryptography, stronger encryption and private key usage for communication between bots.…”
Section: Introductionmentioning
confidence: 99%