2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) 2015
DOI: 10.1109/isco.2015.7282353
|View full text |Cite
|
Sign up to set email alerts
|

Detection of botnet by analyzing network traffic flow characteristics using open source tools

Abstract: Botnets are emerging as the most serious cyber threat among different forms of malware. Today botnets have been facilitating to launch many cybercriminal activities like DDoS, click fraud, phishing attacks etc. The main purpose of botnet is to perform massive financial threat. Many large organizations, banks and social networks became the target of bot masters. Botnets can also be leased to motivate the cybercriminal activities. Recently several researches and many efforts have been carried out to detect bot, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…For example, Richer (2017) [40] proposes an approach using Support Vector Machine and got a 100% detection rate; however the false positive rate is more than 15%. The work by Shanti & Seenivasan (2015) [14] also provides very high false positive which is more than 21%. Above all, Warmer (2011) had the highest false positive value of 44.3% by using Naïve Bayes.…”
Section: Zhao Et Al (2013)mentioning
confidence: 97%
See 3 more Smart Citations
“…For example, Richer (2017) [40] proposes an approach using Support Vector Machine and got a 100% detection rate; however the false positive rate is more than 15%. The work by Shanti & Seenivasan (2015) [14] also provides very high false positive which is more than 21%. Above all, Warmer (2011) had the highest false positive value of 44.3% by using Naïve Bayes.…”
Section: Zhao Et Al (2013)mentioning
confidence: 97%
“…Thus, this indicates that there is still room for improvement in Botnet detection, uniquely encrypted Botnet. Many Botnet detection techniques are based on payload analysis, and these techniques, unfortunately, are inefficient for encrypted C&C channels (Shanti & Seenivasan, 2015) [14]. [15] prove that Botnet detection techniques that rely on payload analysis could be foiled by encryption.…”
Section: Malaysia Botnet Drone 2012-2017mentioning
confidence: 99%
See 2 more Smart Citations
“…They calculated the flow statistics of the obvious attacker targeting a specific port and identify the nuisance attackers based on the similarity of features between hosts sending flow to port P and the samples. K Shanthi et al, [16] proposed a novel method of classify bots from normal hosts through traffic flow analysis based on time intervals. The authors did not include payload inspection.…”
Section: Related Workmentioning
confidence: 99%