Automated Simulation P2P Botnets Signature Detection by Rule-based Approach

Abstract

Internet is a most salient services in communication. Thus, companies take this opportunity by putting critical resources online for effective business organization. This has given rise to activities of cyber criminals actuated by botnets. P2P networks had gained popularity through distributed applications such as file-sharing, web caching and network storage whereby it is not easy to guarantee that the file exchanged not the malicious in non-centralized authority of P2P networks. For this reason, these networks become the suitable venue for malicious software to spread. It is straightforward for attackers to target the vulnerable hosts in existing P2P networks as bot candidates and build their zombie army. They can be used to compromise a host and make it become a P2P bot. In order to detect these botnets, a complete flow analysis is necessary. In this paper, we proposed an automated P2P botnets through rule-based detection approach which currently focuses on P2P signature illumination. We consider both of synchronisation within a botnets and the malicious behaviour each bot exhibits at the host or network level to recognize the signature and activities in P2P botnets traffic. The rule-based approach have high detection accuracy and low false positive.

Authors and Affiliations

Raihana Abdullah, Faizal M. A. , Zul Noh, Nurulhuda Ahmad

Keywords

Related Articles

Towards a Context-Dependent Approach for Evaluating Data Quality Cost

Data-related expertise is a central and determining factor in the success of many organizations. Big Tech companies have developed an operational environment that extracts benefit from collected data to increase the effi...

Outsourcing of Secure k-Nearest Neighbours Interpolation Method

Cloud computing becomes essential in these days for the enterprises. Most of the large companies are moving their services and data to the cloud servers which offer flexibility and efficiency. Data owner (DO) hires a clo...

Direct Torque Control of Saturated Doubly-Fed Induction Generator using High Order Sliding Mode Controllers

The present work examines a direct torque control strategy using a high order sliding mode controllers of a doubly-fed induction generator (DFIG) incorporated in a wind energy conversion system and working in saturated s...

Design of Mobile Application for Travelers to Transport Baggage and Handle Check-in Process

In this paper, an Android based application called ‘Baggage Check-in Handling System’ is developed for helping travelers/passengers transport their baggage to the airport and handle the check-in process. It is merging th...

Segment, Track, Extract, Recognize and Convert Sign Language Videos to Voice/Text

This paper summarizes various algorithms used to design a sign language recognition system. Sign language is the language used by deaf people to communicate among themselves and with normal people. We designed a real tim...

Download PDF file
  • EP ID EP138904
  • DOI 10.14569/IJACSA.2016.070819
  • Views 97
  • Downloads 0

How To Cite

Raihana Abdullah, Faizal M. A. , Zul Noh, Nurulhuda Ahmad (2016). Automated Simulation P2P Botnets Signature Detection by Rule-based Approach. International Journal of Advanced Computer Science & Applications, 7(8), 131-135. https://europub.co.uk./articles/-A-138904