Peer to Peer Detection Based on Node Traffic Behavior

Peer to Peer Detection Based on Node Traffic Behavior PDF Author: Suyu Gu
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 174

Get Book Here

Book Description
A botnet, which is created to conduct large-scale illegal activities, has become a serious threat to the Internet. Recently, botnets started to utilize a decentralized structure in their command and control channel, which is a more robust and resilient communication infrastructure. P2P botnets, created based on a variety of P2P protocols, are the most representative decentralized botnets and have caused great loss to Internet users. Although a lot of botnet detection techniques have been developed, the existing P2P botnet detection methods are still limited. In this thesis, we present a novel P2P botnet detection system based on an analysis of network behavior. The proposed detection system consists of three main components: Network Packets Capturing, Node Feature Extraction, and Online Classifier. In this thesis, we explain the proposed algorithms and implementation methods for each component in detail. Moreover, in this thesis we also present two novel combined classifiers that integrate supervised machine learning and unsupervised machine learning techniques. One, called Sequential Combined Classifier aims at further enhancing the detection rate; the other one, called Parallel Combined Classifier aims at detecting unknown P2P botnet traffic. Based on three real-world network traffic trace sets (i.e. Storm trace, Waledac trace, and normal traffic trace), a series of evaluation experiments are conducted and their results are reported in this thesis. Several contributions from the evaluation results include (1) identification of an appropriate time window size that allows to provide a better detection performance when used in system's packets capturing module; (2) optimized configuration for system's online classifier in each time window size; and (3) evaluated the effectiveness of two proposed combined classifiers and verified their ability to improve detection rate or detect unknown botnet traffic. According experimental results, we obtain the detection accuracy of 99.0% and the false positive rate of 0.1%.

Peer to Peer Detection Based on Node Traffic Behavior

Peer to Peer Detection Based on Node Traffic Behavior PDF Author: Suyu Gu
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 174

Get Book Here

Book Description
A botnet, which is created to conduct large-scale illegal activities, has become a serious threat to the Internet. Recently, botnets started to utilize a decentralized structure in their command and control channel, which is a more robust and resilient communication infrastructure. P2P botnets, created based on a variety of P2P protocols, are the most representative decentralized botnets and have caused great loss to Internet users. Although a lot of botnet detection techniques have been developed, the existing P2P botnet detection methods are still limited. In this thesis, we present a novel P2P botnet detection system based on an analysis of network behavior. The proposed detection system consists of three main components: Network Packets Capturing, Node Feature Extraction, and Online Classifier. In this thesis, we explain the proposed algorithms and implementation methods for each component in detail. Moreover, in this thesis we also present two novel combined classifiers that integrate supervised machine learning and unsupervised machine learning techniques. One, called Sequential Combined Classifier aims at further enhancing the detection rate; the other one, called Parallel Combined Classifier aims at detecting unknown P2P botnet traffic. Based on three real-world network traffic trace sets (i.e. Storm trace, Waledac trace, and normal traffic trace), a series of evaluation experiments are conducted and their results are reported in this thesis. Several contributions from the evaluation results include (1) identification of an appropriate time window size that allows to provide a better detection performance when used in system's packets capturing module; (2) optimized configuration for system's online classifier in each time window size; and (3) evaluated the effectiveness of two proposed combined classifiers and verified their ability to improve detection rate or detect unknown botnet traffic. According experimental results, we obtain the detection accuracy of 99.0% and the false positive rate of 0.1%.

Botnet Detection

Botnet Detection PDF Author: Wenke Lee
Publisher: Springer Science & Business Media
ISBN: 0387687688
Category : Computers
Languages : en
Pages : 178

Get Book Here

Book Description
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.

Software Engineering and Computer Systems, Part III

Software Engineering and Computer Systems, Part III PDF Author: Jasni Mohamad Zain
Publisher: Springer Science & Business Media
ISBN: 3642222021
Category : Computers
Languages : en
Pages : 843

Get Book Here

Book Description
This Three-Volume-Set constitutes the refereed proceedings of the Second International Conference on Software Engineering and Computer Systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011. The 190 revised full papers presented together with invited papers in the three volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on software engineering; network; bioinformatics and e-health; biometrics technologies; Web engineering; neural network; parallel and distributed; e-learning; ontology; image processing; information and data management; engineering; software security; graphics and multimedia; databases; algorithms; signal processing; software design/testing; e- technology; ad hoc networks; social networks; software process modeling; miscellaneous topics in software engineering and computer systems.

Data Traffic Monitoring and Analysis

Data Traffic Monitoring and Analysis PDF Author: Ernst Biersack
Publisher: Springer
ISBN: 3642367844
Category : Computers
Languages : en
Pages : 370

Get Book Here

Book Description
This book was prepared as the Final Publication of COST Action IC0703 "Data Traffic Monitoring and Analysis: theory, techniques, tools and applications for the future networks". It contains 14 chapters which demonstrate the results, quality,and the impact of European research in the field of TMA in line with the scientific objective of the Action. The book is structured into three parts: network and topology measurement and modelling, traffic classification and anomaly detection, quality of experience.

Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020)

Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) PDF Author: Ajith Abraham
Publisher: Springer Nature
ISBN: 303073689X
Category : Technology & Engineering
Languages : en
Pages : 1061

Get Book Here

Book Description
This book highlights the recent research on soft computing and pattern recognition and their various practical applications. It presents 62 selected papers from the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) and 35 papers from the 16th International Conference on Information Assurance and Security (IAS 2020), which was held online, from December 15 to 18, 2020. A premier conference in the field of artificial intelligence, SoCPaR-IAS 2020 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from 40 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.

Peer-to-Peer Systems IV

Peer-to-Peer Systems IV PDF Author: Miguel Castro
Publisher: Springer Science & Business Media
ISBN: 3540290680
Category : Computers
Languages : en
Pages : 297

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Peer-to-Peer Systems, IPTPS 2005, held at Cornell University, Ithaca, NY, USA, in February 2005. The 24 revised full papers were carefully selected during two rounds of reviewing and improvements from 123 submissions. The papers document the state of the art in peer-to-peer computing research. They are organized in topical sections on security and incentives, search, multicast, overlay algorithms, empirical studies, and network locality. The proceedings also include a report with a summary of discussions held at the workshop.

Trustworthy Computing and Services

Trustworthy Computing and Services PDF Author: Yuyu Yuan
Publisher: Springer
ISBN: 3642357954
Category : Computers
Languages : en
Pages : 754

Get Book Here

Book Description
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.

Human Centered Computing

Human Centered Computing PDF Author: Danijela Milošević
Publisher: Springer Nature
ISBN: 3030374297
Category : Computers
Languages : en
Pages : 729

Get Book Here

Book Description
This book constitutes thoroughly reviewed, revised and selected papers from the 5th International Conference on Human Centered Computing, HCC 2019, held in Čačak, Serbia, in August 2019. The 48 full and 23 short papers presented in this volume were carefully reviewed and selected from a total of 133 submissions. The papers focus on deep learning and its applications on a variety of real-life problems, ranging from image/video analysis, to human-computer interaction, and to logistics and supply chain management.

Cryptology and Network Security

Cryptology and Network Security PDF Author: Michel Abdalla
Publisher: Springer
ISBN: 3319029371
Category : Computers
Languages : en
Pages : 364

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.

Handbook of Research on Network Forensics and Analysis Techniques

Handbook of Research on Network Forensics and Analysis Techniques PDF Author: Shrivastava, Gulshan
Publisher: IGI Global
ISBN: 1522541012
Category : Computers
Languages : en
Pages : 542

Get Book Here

Book Description
With the rapid advancement in technology, myriad new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. The Handbook of Research on Network Forensics and Analysis Techniques is a current research publication that examines the advancements and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring coverage on a broad range of topics including cryptocurrency, hand-based biometrics, and cyberterrorism, this publication is geared toward professionals, computer forensics practitioners, engineers, researchers, and academics seeking relevant research on the development of forensic tools.