2014 IEEE Security and Privacy Workshops 2014
DOI: 10.1109/spw.2014.25
|View full text |Cite
|
Sign up to set email alerts
|

PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations

Abstract: Abstract-The decentralized nature of Peer-to-Peer (P2P) botnets makes them difficult to detect. Their distributed nature also exhibits resilience against take-down attempts. Moreover, smarter bots are stealthy in their communication patterns, and elude the standard discovery techniques which look for anomalous network or communication behavior. In this paper, we propose PeerShark, a novel methodology to detect P2P botnet traffic and differentiate it from benign P2P traffic in a network. Instead of the traditio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(44 citation statements)
references
References 20 publications
0
43
1
Order By: Relevance
“…Some security researchers believe that the statistical behavior of P2P botnets is better extracted using 2‐tuple conversation instead of 5‐tuple flow . Peershark is a conversation‐based statistical P2P botnet detection approach which not only can recognize P2P botnet traffic from legitimate P2P traffic but also can correctly classify the P2P application running on a host. A set of four features is introduced in this work to characterize the conversations.…”
Section: A Taxonomy Of P2p Botnet Detection Footprintsmentioning
confidence: 99%
“…Some security researchers believe that the statistical behavior of P2P botnets is better extracted using 2‐tuple conversation instead of 5‐tuple flow . Peershark is a conversation‐based statistical P2P botnet detection approach which not only can recognize P2P botnet traffic from legitimate P2P traffic but also can correctly classify the P2P application running on a host. A set of four features is introduced in this work to characterize the conversations.…”
Section: A Taxonomy Of P2p Botnet Detection Footprintsmentioning
confidence: 99%
“…We adopt some features for P2P application traffic categorization and botnet detection used in [5,8,9,26]. We list our feature set as follows: We compare the detection performance of our feature set with the works by Rahbarinia et al [5] and Narang et al [26].…”
Section: Feature Selectionmentioning
confidence: 99%
“…Narang et al [8] used a 2-tuple conversation approach for P2P botnet detection and relied only on the information obtained from the TCP/UDP/IP headers. They also used machine learning algorithms to classify the traffic and obtained pretty good prediction rate.…”
Section: Network-based and Flow-based Botnet Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…CluSiBotHealer uses packet and flow characteristics of P2P botnets and uses clustering unlike supervised methods used in [19]. In a recent work, conversation based P2P botnet detection "PeerShark" [20] has been proposed. PeerShark is a Port oblivious and Protocol oblivious technique that uses supervised learning algorithms.…”
Section: Related Workmentioning
confidence: 99%