Automated Simulation P2P Botnets Signature Detection by Rule-based Approach
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 8
Abstract
Internet is a most salient services in communication. Thus, companies take this opportunity by putting critical resources online for effective business organization. This has given rise to activities of cyber criminals actuated by botnets. P2P networks had gained popularity through distributed applications such as file-sharing, web caching and network storage whereby it is not easy to guarantee that the file exchanged not the malicious in non-centralized authority of P2P networks. For this reason, these networks become the suitable venue for malicious software to spread. It is straightforward for attackers to target the vulnerable hosts in existing P2P networks as bot candidates and build their zombie army. They can be used to compromise a host and make it become a P2P bot. In order to detect these botnets, a complete flow analysis is necessary. In this paper, we proposed an automated P2P botnets through rule-based detection approach which currently focuses on P2P signature illumination. We consider both of synchronisation within a botnets and the malicious behaviour each bot exhibits at the host or network level to recognize the signature and activities in P2P botnets traffic. The rule-based approach have high detection accuracy and low false positive.
Authors and Affiliations
Raihana Abdullah, Faizal M. A. , Zul Noh, Nurulhuda Ahmad
Towards a Context-Dependent Approach for Evaluating Data Quality Cost
Data-related expertise is a central and determining factor in the success of many organizations. Big Tech companies have developed an operational environment that extracts benefit from collected data to increase the effi...
Outsourcing of Secure k-Nearest Neighbours Interpolation Method
Cloud computing becomes essential in these days for the enterprises. Most of the large companies are moving their services and data to the cloud servers which offer flexibility and efficiency. Data owner (DO) hires a clo...
Direct Torque Control of Saturated Doubly-Fed Induction Generator using High Order Sliding Mode Controllers
The present work examines a direct torque control strategy using a high order sliding mode controllers of a doubly-fed induction generator (DFIG) incorporated in a wind energy conversion system and working in saturated s...
Design of Mobile Application for Travelers to Transport Baggage and Handle Check-in Process
In this paper, an Android based application called ‘Baggage Check-in Handling System’ is developed for helping travelers/passengers transport their baggage to the airport and handle the check-in process. It is merging th...
Segment, Track, Extract, Recognize and Convert Sign Language Videos to Voice/Text
This paper summarizes various algorithms used to design a sign language recognition system. Sign language is the language used by deaf people to communicate among themselves and with normal people. We designed a real tim...