Analysis and Improvement Design on P2P Botnets Detection Framework


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Developing the P2P botnets detection framework is crucial when we trying to fight against P2P botnets. Poor detection method can lead to a failure of P2P botnets detection. Thus, it needs to be accurately functioned well. This paper reviews and evaluates various current frameworks of P2P botnets detection and analyzing the existing gaps to make improvement of P2P botnets detection framework. Based on a review that conducted manually, we report our findings and analysis has been done on different frameworks concern on P2P botnets detection. Consequently, the gap and motivations found from this reviews are discussed. Then, the P2P botnets detection framework architecture has been proposed with the new improvement been reinforced by hybrid detection technique, hybrid analyzer and in-depth hybrid analysis. Future directions of this review are to develop the P2P botnets detection system that has capability in high detection accuracy and efficiency.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


P2P Botnets; P2P Botnets Detection; P2P Botnets Framework; P2P Botnets Detection Criteria

Full Text:

PDF


References


Estrada, V.C.; Nakao, A.; A Survey on the Use of Traffic Traces to Battle Internet Threats, Knowledge Discovery and Data Mining, 2010. WKDD '10. Third International Conference on , vol., no., pp.601-604, 9-10 Jan. 2010.

Mielke, C.J.; Hsinchun Chen; , Botnet, and the cybercriminal underground, Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on , vol., no., pp.206-211, 17-20 June 2008.

Sundaram, A. An Introduction to Intrusion Detection. ACM , 2 (4), 3-7, 1996.

Sharon M. R. and Matthew R.: Reasons & Rigor: How Conceptual Frameworks Guide Research: SAGE Publications, 2011.

Anonymous : “What is framework?” Retrieved on October 2013 from http://whatis.techtarget.com/definition/framework.

Laura: “Why use framework?” Retrieved on October 2013 from http://www.asfusion.com/blog/entry/why-use-a-framework.

Matthew Broersma: Botnets getting harder to kill [Online] Retrieved on February 2011 from http://pcworld.about.net/od/cyber crime/Botnets-getting-harder-tokill.htm .

Zeidanloo, H. R., Hosseinpour, F. and Eternad, F.F.: New Approach for Detection of IRC and P2P Botnet. International Journal of Computer and Electrical Engineering Vol. 2(No. 6): 1793-8163, 2010.

Yin, C. and Ghorbani, A.: P2P Botnet Detection Based on Association between Common Network Behaviors and Host Behaviors: IEEE, 2011.

Yuanyuan, Z., H. Xin, et al.: Detection of Botnet using Combined Host-and Network-Level Information. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2010.

Junjie, Z., R. Perdisci, et al.: Detecting Stealthy P2PBotnet Using Statistical Traffic Fingerprints. IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), 2011.

Arshad, S., M. Abbaspour, et al.: An anomaly-based Botnet detection approach for identifying stealthy Botnet. IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE), 2011.

Muthumanickam, K. and Ilavarasan, E. : P2P Botnet Detection: Combined Host and Network-Level Analysis: IEEE, 2012.

Li, H. et al.: P2P Botnet Detection based on Irregular Phased Similarity: IEEE, 2012.

Raihana Syahirah Abdullah et al., “Revealing the Criterion on Botnet Detection Technique”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 3, March 2013, Pages 208-215.

Faizal M. A., Mohd Zaki M., Shahrin S., Robiah Y, Siti Rahayu S., Nazrulazhar B.: Threshold Verification Technique for Network Intrusion Detection System. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 2, No. 1, 2009.

Raihana Syahirah Abdullah et al., “Preliminary study of host and network-based analysis on P2P Botnet detection”; TIME-E Confernece IEEE Bandung, Indonesia: 2013.

Robiah Y, Siti Rahayu S., Mohd Zaki M., Shahrin S., Faizal M. A., Marliza R..: A New Generic Taxonomy on Hybrid Malware Detection Technique. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 5, No. 1, 2009.

Sabahi, F. and Movaghar, A.: Intrusion Detection: A Survey. The Third International Conference on System and Networks Communication, 2008.

Robiah Y., Siti Rahayu S., et. al.: An Improved Traditional Worm Attack Pattern: IEEE, 2010.

Vivek A.: TCP/IP and Distributed System: Firewall Media, New Delhi, India, 2006.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize