Skip to main content

An Advanced Hyper-Efficient Design to Detect Random Peer-to-Peer Botnets

  • Conference paper
  • First Online:
Communication Technologies, Information Security and Sustainable Development (IMTIC 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 414))

Included in the following conference series:

  • 774 Accesses

Abstract

Botnets have become one of the most solemn threats to Internet security. Botnets comprises over a network of infected nodes known as ‘bot’. Bots are controlled by human operators (botmasters). Random nature of Peer-to-Peer botnets has influenced sinkhole researchers to compromise over occupation of hunted command and control in a complex manner and due to variable nature of action, they are often good deserters. In this paper, we present a design of an advanced hyper-efficient mechanism which has the ability to pursue Peer-to-Peer randomized botnets. It provides capacity to detain targeted sinkholes and identify arbitrary execution of contagion in infected nodes. In the end, method acquires the composition of different cubic formations for proper lookup of random natured Peer-to-Peer botnets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grizzard, J.B., et al.: Peer-to-peer botnets: overview and case study. In: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets (2007)

    Google Scholar 

  2. Puri, R.: Bots & botnet: an overview. SANS Institute 2003 (2003)

    Google Scholar 

  3. McCarty, B.: Botnets: big and bigger. IEEE Secur. Priv. 1(4), 87–90 (2003)

    Article  Google Scholar 

  4. Arce, I., Levy, E.: An analysis of the slapper worm. IEEE Secur. Priv. Mag. 1, 82–87 (2003)

    Article  Google Scholar 

  5. Zhou, Y., Xuxian J.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy (SP). IEEE (2012)

    Google Scholar 

  6. Zeng, J., Tang, W., Liu, C., Hu, J., Peng, L.: Efficient detect scheme of botnet command and control communication. In: Liu, C., Wang, L., Yang, A. (eds.) ICICA 2012, Part I. CCIS, vol. 307, pp. 576–581. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Rodríguez-Gómez, R.A., Maciá-Fernández, G., GarcíaTeodoro, P.: Survey and taxonomy of botnet research through lifecycle. ACM Comput. Surv. (CSUR) 45, 45 (2013)

    Article  Google Scholar 

  8. Narang, P., Reddy, J.M., Hota, C.: Feature selection for detection of peer-to-peer botnet traffic. In: Proceedings of the 6th ACM India Computing Convention. ACM (2013)

    Google Scholar 

  9. Li, H., et al.: Modeling to understand P2P botnets. In: IEEE Second International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC) (2012)

    Google Scholar 

  10. Han, K.-S., Im, E.G.: A Survey on P2P Botnet Detection. In: Kim, K.J., Ahn, S.J. (eds.) Proceedings of the International Conference on IT Convergence and Security 2011. LNEE, vol. 120, pp. 589–593. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Xu, Z., et al.: Utilizing enemies’ P2P strength against them. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (2012)

    Google Scholar 

  12. Lu, C., Brooks, R.R.: P2P hierarchical botnet traffic detection using hidden markov models. In: Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results. ACM (2012)

    Google Scholar 

  13. Greengard, S.: The war against botnets. Commun. ACM 55, 16–18 (2012)

    Article  Google Scholar 

  14. Dave, V., Guha, S., Zhang, Y.: ViceROI: catching click-spam in search ad networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)

    Google Scholar 

  15. Wichmann, A., Gerhards-Padilla, E.: Using infection markers as a vaccine against malware attacks. In: IEEE International Conference on Green Computing and Communications (GreenCom), pp. 737–742, 20–23 November 2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isma Farah Siddiqui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Siddiqui, I.F., Faseeh, N.M., Lee, S.UJ., Unar, M.A. (2014). An Advanced Hyper-Efficient Design to Detect Random Peer-to-Peer Botnets. In: Shaikh, F., Chowdhry, B., Zeadally, S., Hussain, D., Memon, A., Uqaili, M. (eds) Communication Technologies, Information Security and Sustainable Development. IMTIC 2013. Communications in Computer and Information Science, vol 414. Springer, Cham. https://doi.org/10.1007/978-3-319-10987-9_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10987-9_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10986-2

  • Online ISBN: 978-3-319-10987-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics