2013
DOI: 10.1007/978-3-642-39235-1_4
|View full text |Cite
|
Sign up to set email alerts
|

PeerRush: Mining for Unwanted P2P Traffic

Abstract: Abstract. In this paper we present PeerRush, a novel system for the identification of unwanted P2P traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can accurately categorize the detected P2P traffic and attribute it to specific P2P applications, including malicious applications such as P2P botnets. PeerRush achieves these results without the need of deep packet inspection, and can accurately identify applications that use encrypted P2P traffic. We implemented a prototype vers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(32 citation statements)
references
References 14 publications
0
30
0
Order By: Relevance
“…We adopt the approach used in PeerRush [5] and collect network traffic samples generated by different P2P botnets and normal P2P applications from [5]. To train our classification models to find out network traffic of P2P botnet, we use network traffic trace files of Storm and Zeus Botnet as malicious training samples.…”
Section: Building Detection Model and Training Setmentioning
confidence: 99%
See 2 more Smart Citations
“…We adopt the approach used in PeerRush [5] and collect network traffic samples generated by different P2P botnets and normal P2P applications from [5]. To train our classification models to find out network traffic of P2P botnet, we use network traffic trace files of Storm and Zeus Botnet as malicious training samples.…”
Section: Building Detection Model and Training Setmentioning
confidence: 99%
“…Botnets represent a collaborative and highly distributed platform that conduct a wide range of malicious and illegal activities, such as launching Distributed Denial of Service (DDoS) attacks, sending SPAM e-mails and click fraud, and collecting confidential information. In order to mitigate security threat posed by botnets, many detection methods have been proposed in the literature over the last decade [1][2][3][4][5][6]. These detection methods are based on numerous technical principles and assumptions that the botnets produce their own behaviors and the patterns of network traffic.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The dataset of P2P botnet traffic is obtained from a third party (Rahbarinia et al, 2013). This dataset includes a five-hour trace of Waledac, which contains three bots; a 24-hour trace of Zeus, which contains one bot; and a 6.15-hour trace of Neris, which also contains one bot.…”
Section: Dataset Of P2p Botnet Trafficmentioning
confidence: 99%
“…Similarly, Waledac and P2P Zeus traffic traces were obtained from Department of Computer Science, University of Georgia. These traces were also used in the botnet related research works of [23]. A botnet's packet sizes are usually smaller and are seldom to the size of MTU.…”
Section: B Data Overviewmentioning
confidence: 99%