2014 Annual IEEE India Conference (INDICON) 2014
DOI: 10.1109/indicon.2014.7030393
|View full text |Cite
|
Sign up to set email alerts
|

Fast-flux botnet detection from network traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Several pieces of information can be extracted from the network traffic for the aim of solving several network-related problems, especially for the problem of the fast flux botnet. The network traffic consists of non-DNS traffic and DNS ones like the ones in Al-Duwairi and Al-Hammouri (2014) and Paul et al (2014). The huge amount of data travelling via the router and the speed shall lead to causing problems for any proposed system.…”
Section: Router-based Detection Methodsmentioning
confidence: 99%
“…Several pieces of information can be extracted from the network traffic for the aim of solving several network-related problems, especially for the problem of the fast flux botnet. The network traffic consists of non-DNS traffic and DNS ones like the ones in Al-Duwairi and Al-Hammouri (2014) and Paul et al (2014). The huge amount of data travelling via the router and the speed shall lead to causing problems for any proposed system.…”
Section: Router-based Detection Methodsmentioning
confidence: 99%
“…Various information extracted from network traffic to solve several network problems, generally and particularly for the fast -flux botnet problem. Network traffic comprises both DNS traffic and non-DNS traffic such in [10,11] However, the speed and the large amount of data passing through the router cause problems to any proposed systems: high false rates based on the concept of a fast detection of FF botnets, memory problems (databases) with regard to handling large traffic data flows, and scalability problem. Therefore, detecting fast flux botnets and particularly zero-day domains at this part of the network is not an easy task.…”
Section: B Router-based Detection Methodsmentioning
confidence: 99%
“…On the other hand, information about legal flux service is more genuine detailed. Consequently, a fast-flux attack holds the following poor quality (Al-Duwairi and Al-Hammouri, 2014; Celik & Oktug, 2013;Futai, Siyu, & Weixiong, 2013;Gržnić, Perhoč, Marić, Vlašić, & Kulcsar, 2014;Hao et al, 2011;Hsu, Huang, & Chen, 2010;Hsu et al, 2014, Huang, Mao, & Lee, 2010Khattak, Ramay, Khan, Syed, & Khayam, 2014;Lin, Lin, & Chiang, 2013;Mahjoub, 2013;Martinez-Bea, Castillo-Perez, & GarciaAlfaro, 2013;Paul, Tyagi, Manoj, & Thanudas, 2014;Shen, Wu, Yang, & Huang, 2013;Stalmans, Hunter, & Irwin, 2012;Wang, Mao, Wu, & Lee, 2012;Yadav, Reddy, Narasimha Reddy, & Ranjan, 2012):…”
Section: Characterizing Fast-flux Attackmentioning
confidence: 99%
“…Some researchers apply these techniques in detecting the fast-flux attacking network (Kadir, Othman, & Aziz, 2012;Perdisci, Corona, & Giacinto, 2012).These works focus on the comprehensive and effective usage of the existing metrics rather than on finding new signatures. Among these machine learning methods, the results vary significantly (Mahjoub, 2013;Paul et al, 2014;Wu, Zhang, Liang, Qu, & Ni, 2010). In generally, linear regression system works worst.…”
Section: The Work About Machine Learning For Detectionmentioning
confidence: 99%