2010
DOI: 10.4304/jnw.5.5.568-576
|View full text |Cite
|
Sign up to set email alerts
|

Online Botnet Detection Based on Incremental Discrete Fourier Transform

Abstract: Botnet detection has attracted lots of attention since botnet attack is becoming one of the most serious threats on the Internet. But little work has considered the online detection. In this paper, we propose a novel approach that can monitor the botnet activities in an online way. We define the conce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 12 publications
0
19
0
Order By: Relevance
“…Dynamic malware analysis systems like Anubis [8], CWSandbox [50] and others [16,22,27,36,42] have proven invaluable in generating ground truth characterizations of malware behavior. The anti-malware community regularly applies these ground truths in scientific experiments, for example to evaluate malware detection technologies [2,10,17,19,24,26,30,33,44,48,[52][53][54], to disseminate the results of large-scale malware experiments [6,11,42], to identify new groups of malware [2,5,38,41], or as training datasets for machine learning approaches [20,34,35,38,40,41,47,55]. However, while analysis of malware execution clearly holds importance for the community, the data collection and subsequent analysis processes face numerous potential pitfalls.…”
Section: Introductionmentioning
confidence: 99%
“…Dynamic malware analysis systems like Anubis [8], CWSandbox [50] and others [16,22,27,36,42] have proven invaluable in generating ground truth characterizations of malware behavior. The anti-malware community regularly applies these ground truths in scientific experiments, for example to evaluate malware detection technologies [2,10,17,19,24,26,30,33,44,48,[52][53][54], to disseminate the results of large-scale malware experiments [6,11,42], to identify new groups of malware [2,5,38,41], or as training datasets for machine learning approaches [20,34,35,38,40,41,47,55]. However, while analysis of malware execution clearly holds importance for the community, the data collection and subsequent analysis processes face numerous potential pitfalls.…”
Section: Introductionmentioning
confidence: 99%
“…Although most existing researches evaluated their bot detection solution using self-made or limited number of bot samples, we used 250 real bot samples to evaluate BBDP. The proposed solution performs better than compared solutions except Yu's et al work [10]. However, their work was only evaluated by four self-made bots.…”
Section: Discussionmentioning
confidence: 79%
“…Comparison of the proposed solution against other previous works.The proposed solution (BBDP)Park et al[9] Yu et al[10] Wang et al[8] BBDP, behavior-based botnet detection in parallel; IRC, Internet Relay Chat; HTTP, hypertext transfer protocol.…”
mentioning
confidence: 99%
“…Yu et al [24] proposed online botnet detection based on an incremental discrete Fourier transform approach. They used "feature streams" to describe raw network traffic, and then the feature streams originated from different hosts are compared with the known feature streams.…”
Section: Related Workmentioning
confidence: 99%