2014
DOI: 10.1016/j.jisa.2014.03.002
|View full text |Cite
|
Sign up to set email alerts
|

PeerRush: Mining for unwanted P2P traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(62 citation statements)
references
References 3 publications
0
61
1
Order By: Relevance
“…Flow-based systems [2]- [6], [8], [10]- [14], [18], [19] use header information of network packets (i.e., network flow characteristics) to capture botnets behaviors. Compared with payload-based systems, flow-based systems use less information from the network packets.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Flow-based systems [2]- [6], [8], [10]- [14], [18], [19] use header information of network packets (i.e., network flow characteristics) to capture botnets behaviors. Compared with payload-based systems, flow-based systems use less information from the network packets.…”
Section: Related Workmentioning
confidence: 99%
“…In the experiments, we mixed a background network dataset [7] with 5 P2P botnets datasets and 4 legitimate P2P applications datasets [8]. To make our experimental evaluation as unbiased and challenging as possible, we propose a network traces sampling and mixing method to generate synthetic experimental datasets.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, the human generated traffic does not contain any similarity due to miscellaneous activities. To capture the statistical similarity of botnet traffic, many P2P botnet detection schemes 2,[25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40] proposed in which a group of statistical features is introduced as a P2P botnet footprint. These features are extracted from the botnet traffic and context network traffic.…”
Section: Statistical Characteristicsmentioning
confidence: 99%
“…35,36 The host-based footprints are extracted from the network traffic of each host (like the number of IP addresses it connected to). 2,[37][38][39][40] The proposed footprints related to each class are detailed in following subsections.…”
Section: Statistical Characteristicsmentioning
confidence: 99%
“…We also obtained datasets of 2 popular P2P botnets, Storm and Waledac, from third parties. 20 The dataset of Storm included 13 individual bots, while the dataset of Waledac included 3 individual bots. Table 1 summarizes brief information of the datasets.…”
Section: Dataset Collectionmentioning
confidence: 99%