2013
DOI: 10.1007/978-3-319-03584-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…As a consequence, traffic that is unique to a workstation becomes more pronounced in the visualization. Zhang et al (2012) and Burghouwt et al (2013) both organize HTTP requests in a graph and correlate the graph with user actions in order to detect requests issued by malware. While their approaches rely on recording user actions such as mouse clicks and keystrokes, Hviz operates on network traffic only.…”
Section: Related Workmentioning
confidence: 99%
“…As a consequence, traffic that is unique to a workstation becomes more pronounced in the visualization. Zhang et al (2012) and Burghouwt et al (2013) both organize HTTP requests in a graph and correlate the graph with user actions in order to detect requests issued by malware. While their approaches rely on recording user actions such as mouse clicks and keystrokes, Hviz operates on network traffic only.…”
Section: Related Workmentioning
confidence: 99%
“…Let d l i .< d l t i , d l n i > be the drop‐off position of a c i ( a c i ⊆ A C ( L P )), where d l t i and d l n i are the latitude and the longitude of d l i , respectively. To obtain the gathered traces of a c i , the concept of neighborhood domain is employed. Definition The neighborhood domain within radius r of a c i is defined by N D r ( a c i )={ a c j | D i s ( d l i , d l j )≤ r , a c j ⊆ A C ( L P )}, where D i s ( d l i , d l j ) is calculated by italicDis(dli,dlj)=(dltidltj)2+(dlnidlnj)2. …”
Section: Traffic Hotline Discovery From Big Taxi Gps Datamentioning
confidence: 99%
“…Let d l i : < dlt i ; d ln i > be the drop-off position of ac i (ac i  AC.L P /), where d lt i and d ln i are the latitude and the longitude of d l i , respectively. To obtain the gathered traces of ac i , the concept of neighborhood domain [16] is employed.…”
Section: Algorithm 2 Alighting Collection Acquisitionmentioning
confidence: 99%
“…Burghouwt et al use causal relationships between flows to detect botnet C&C traffic [4]. Instead of the destination, detection is based on the direct cause of a flow.…”
Section: Related Workmentioning
confidence: 99%