TY - GEN
T1 - P2P Botnets detection based on user behavior sociality and traffic entropy function
AU - Zhigang, Jin
AU - Ying, Wang
AU - Bo, Wei
N1 - Copyright:
Copyright 2012 Elsevier B.V., All rights reserved.
PY - 2012
Y1 - 2012
N2 - Monitoring data of recent years from Symantec Company shows Botnet is becoming the base of all network crime. As P2P is being more widely used these days, some new Bots use P2P protocols to construct command and control system. This paper introduces Botnet detection methods, studies detection mechanism towards P2P Botnets based on user behavior, and proposes a new case to identify P2P Botnet. To test and verify function of the method we provide, a simple experiment platform is designed and implemented.
AB - Monitoring data of recent years from Symantec Company shows Botnet is becoming the base of all network crime. As P2P is being more widely used these days, some new Bots use P2P protocols to construct command and control system. This paper introduces Botnet detection methods, studies detection mechanism towards P2P Botnets based on user behavior, and proposes a new case to identify P2P Botnet. To test and verify function of the method we provide, a simple experiment platform is designed and implemented.
KW - Botnet
KW - Entropy
KW - P2P
KW - Sociality Analysis
UR - http://www.scopus.com/inward/record.url?scp=84861881111&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84861881111&partnerID=8YFLogxK
U2 - 10.1109/CECNet.2012.6202113
DO - 10.1109/CECNet.2012.6202113
M3 - Conference contribution
AN - SCOPUS:84861881111
SN - 9781457714153
T3 - 2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012 - Proceedings
SP - 1953
EP - 1955
BT - 2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012 - Proceedings
T2 - 2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012
Y2 - 21 April 2012 through 23 April 2012
ER -