2016
DOI: 10.1016/j.comcom.2016.05.017
|View full text |Cite
|
Sign up to set email alerts
|

Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…P2P bots form structured P2P topologies (bot‐only) or join an existing P2P network (parasite and leeching) and communicate through custom or well‐known P2P protocols. Consequently, such traffic can easily blend in with legitimate P2P traffic . However, this challenge is considered in a few P2P botnet detection schemes.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…P2P bots form structured P2P topologies (bot‐only) or join an existing P2P network (parasite and leeching) and communicate through custom or well‐known P2P protocols. Consequently, such traffic can easily blend in with legitimate P2P traffic . However, this challenge is considered in a few P2P botnet detection schemes.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the C&C communication also follows certain timing patterns. This periodic behavior is utilized in some botnet detection proposals() as P2P botnet footprint.…”
Section: A Taxonomy Of P2p Botnet Detection Footprintsmentioning
confidence: 99%
See 3 more Smart Citations