2015
DOI: 10.1007/978-3-319-23829-6_13
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations

Abstract: We present a novel anomaly-based detection approach capable of detecting botnet Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. A traffic flow is classified as anomalous if its destination identifier does not origin from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications. This allows for real-time detection of diverse types of Command and Control traffic. The detection approach and its accuracy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Their results indicate that statistical modelling of APT communications can successfully develop deterministic characteristics for detection. Burghouwt et al [11] proposed a novel approach to real-time detection of C2 channels based on trust of trafc destinations. In the approach, a destination can become trusted by transitivity, if its origin can be evaluated by another trusted entity.…”
Section: Flow-based Analysismentioning
confidence: 99%
“…Their results indicate that statistical modelling of APT communications can successfully develop deterministic characteristics for detection. Burghouwt et al [11] proposed a novel approach to real-time detection of C2 channels based on trust of trafc destinations. In the approach, a destination can become trusted by transitivity, if its origin can be evaluated by another trusted entity.…”
Section: Flow-based Analysismentioning
confidence: 99%