首页    期刊浏览 2024年12月11日 星期三
登录注册

文章基本信息

  • 标题:PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification
  • 本地全文:下载
  • 作者:Pratik Narang ; Chittaranjan Hota ; VN Venkatakrishnan
  • 期刊名称:EURASIP Journal on Information Security
  • 印刷版ISSN:1687-4161
  • 电子版ISSN:1687-417X
  • 出版年度:2014
  • 卷号:2014
  • 期号:1
  • DOI:10.1186/s13635-014-0015-3
  • 语种:English
  • 出版社:Hindawi Publishing Corporation
  • 摘要:The distributed and decentralized nature of peer-to-peer (P2P) networks has offered a lucrative alternative to bot-masters to build botnets. P2P botnets are not prone to any single point of failure and have been proven to be highly resilient against takedown attempts. Moreover, smarter bots are stealthy in their communication patterns and elude the standard discovery techniques which look for anomalous network or communication behavior. In this paper, we present a methodology to detect P2P botnet traffic and differentiate it from benign P2P traffic in a network. Our approach neither assumes the availability of any ‘seed’ information of bots nor relies on deep packet inspection. It aims to detect the stealthy behavior of P2P botnets. That is, we aim to detect P2P botnets when they lie dormant (to evade detection by intrusion detection systems) or while they perform malicious activities (spamming, password stealing, etc.) in a manner which is not observable to a network administrator.Our approach PeerSharkPeerShark combines the benefits of flow-based and conversation-based approaches with a two-tier architecture, and addresses the limitations of these approaches. By extracting statistical features from the network traces of P2P applications and botnets, we build supervised machine learning models which can accurately differentiate between benign P2P applications and P2P botnets. PeerSharkPeerShark could also detect unknown P2P botnet traffic with high accuracy.
  • 关键词:Botnets;Peer-to-peer;Machine learning;Security
国家哲学社会科学文献中心版权所有