SlideShare a Scribd company logo
Study and Analysis of botnets
and botnet detection
Techniques
Candidate : G.Kirubavathi
Reg No : 71010112041
Guide : Dr.R.Anitha
Associate Professor
Department of Applied Mathematics and Computational Sciences
PSG College of Technology
Outline
 Introduction
 Botnet Detection
 HTTP Botnet Detection
 Future Work
 Conclusions
 References
What is the need for Botnet Detection?
 Aug 4 2010 - Zeus v2 Botnet that owned 100,000 UK PCs
taken out
 Aug 12 2010 - Zeus v3 botnet raid on UK bank accounts
 In 2013, Chameleon Botnet' takes $6-million-a-month in
ad money
 Word press hit by large scale botnet attack 5th April 2013.
3
Botnet
 Bot is a self propagating application that infects
vulnerable host through direct exploitation or Trojan
insertion.
 A Botnet consists of a network of compromised
computers (“bots”) controlled by an attacker
(“botmaster”)
 Botnets are classified as,
 IRC Botnet
 HTTP Botnet
 P2P Botnet
based on the communication protocol,
Classification of Botnet Detection
Techniques
Honey nets
Intrusion Detection System
Signature Based Anomaly Based
Host Based Network Based
Active Monitoring Passive Monitoring
HTTP Botnet Detection using
Adaptive Learning Rate MLFF-NN
 Recent botnets have begun using common
protocols such as HTTP
 HTTP bot communications are based on TCP
connections
 TCP related features have been identified for the
detection of HTTP botnets
Proposed System Architecture
Network
Traffic
Feature
Extraction
Normalization
Pre-processing
Neural Network Classifier
Training
Set
Testing
Set
NN
Training
NN
Model
Evalu
ate
Normal
Bot
Traces of different Web-based
Bonets
Bot Family Trace Size Packets Number
Zeus-1 5.85 MB 53,220
Zeus -2 4.13 MB 37,252
Spyeye -1 25.17 MB 1,75,870
Spyeye -2 3.90 MB 35,180
Identification accuracy of web
botnet traffic profiles
Traffic Traces # neurons in
the ip layer
# neurons in
the hidden
layer
Correct
Identification
Spyeye -1 6 18 99.03%
Spyeye- 2 6 18 99.02%
Zeus -1 6 18 99.01%
Zeus -2 6 18 99.04%
Performance Measures of Spyeye
Botnet
Method Precision Recall F-Measure Accuracy
Decision Tree 0.968 0.931 0.949 96.5333
Random Forest 0.968 0.934 0.950 96.667
RBF 0.976 0.927 0.950 96.5333
FF NN 0.964 0.983 0.973 99.03
ROC curve for Spyeye Botnet
Performance Measures of Zeus
Botnet
Method Precision Recall F-Measure Accuracy
Decision Tree 0.956 0.930 0.941 96.14333
Random Forest 0.952 0.930 0.940 96.000
RBF 0.959 0.922 0.940 95.8667
FF NN 0.948 0.992 0.969 99.04
ROC curve for Zeus Botnet
Comparison of Performance
Method Average
Detection
Accuracy
Gu et al (2008), BotMiner – Data mining
Techniques
96.825
Nogueira et al. (2010), Neural Networks 94.9175
Adaptive Learning Neural Networks –
Proposed
99.025
HTTP Botnet Detection using
HsMM with SNMP MIB Variables
 Used Hidden semi-Markov chain Model (HsMM)
to characterize the normal network behavior of
the TCP based MIB variables as observed
sequence.
 Forward-backward algorithm for estimating
model parameters
Proposed System Architecture
Extraction of
the SNMP
MIB Variables
Feature
Reduction by
PCA
HsMM Modeling
Summation
of the SNMP
MIB
Variables
Train Data
Test Data
Forward
Backward
Algorithm
HsMM
Model
AL
LNormal
Bot
Model Construction
 Construct a HsMM to build a profile of normal MIB traffic behavior
and use this model to detect the botnet.
 A HsMM can be described as
 λ = (N, M,V, A, B, П) where
 N is the size of the state space Ф = {0,1}
 V = {v0, v1, …, vM-1} is the set of all visible symbols which are nothing but
the TCP-MIB variables.
 M is the number of all visible symbols is the summation count of the
MIB variables
 A = [aij]NXN is the state transition probability matrix
 The state transition probability matrix A, Assume A= initially,
the process is normal no matter what current state is, the process will
transfer to normal state next time by probability 1.
 where aij = P{next_state = j | current state = i}, where i, j ϵ Ф






01
01
Model Construction Cont…
 B = {bi(k)}, i ϵ Ф, 1 ≤ k ≤ M, is the distribution of visible
symbols V, where bi(k)= P{observed system behavior =
vk | current state i}
 П = [П0, П1, П2, …, ПN-1] is the initial state distribution
Web-based botnet identification
Accuracy
Datasets False +ve Rate Detection
Accuracy
Results
Web Service 0% 100% Normal
FTP Service 0% 100% Normal
Spyeye 1.33% 98.67% Malicious Botnet
Black energy 1.28% 98.72% Malicious Botnet
Future Work
 Analyzing the various types of current botnet
activities.
 Identify the suitable statistical modeling techniques to
detect the botnet irrespective of their communication
protocols and Command and Control structures
Conclusion
 Botnets pose a significant and growing threat
against cyber security
 It provides key platform for many cyber crimes like
DDOS, etc
 As network security has become integral part of our
life and botnets have become the most serious threat
to it
 It is very important to detect botnet attack and find
the solution for it
Published Paper G.Kirubavathi Venkatesh and R.Anitha, “HTTP
Botnet Detection using Adaptive learning Rate
Multilayer Feed-forward Neural Network”. In
Proceedings of international workshop in
information security theory and practice –
WISTP’12, UK, 2012, LNCS 7322, pp. 38-48, 2012.
Paper Communicated
 G.Kirubavathi Venkatesh, V.Srihari, R.Veeramani, RM.
Karthikeyan, R.Anitha “HTTP botnet Detection using
Hidden semi-Markov Model with SNMP MIB
variables”, has been communicated to the
International journal of Security and Communication
Networks (Wiley publication).
References P. Barford and V. Yegneswaran, “An inside look at botnets,” Springer
Verlag, 2006.
 J. Binkley and S. Singh. “An algorithm for anomaly-based botnet
detection”, In Proceedings of USENIX Steps to Reducing Unwanted Traffic
on the Internet Workshop (SRUTI), pages 43–48, 2006.
 T.Abbes, A.A.Bouhoula, and, M.Rusinowitch, “Protocol Analysis in
Intrusion Detection Using Decision Tree”, Proc. International Conference on
Information Technology, Coding and Computing (ITCC,04) IEEE Xplore,
Pages 404-408.
 Jiong Zhang, Mohammad Zulkernine, Anwar Haque: Random-Forests-
Based Network Intrusion Detection Systems. IEEE Transactions on
Systems, Man, and Cybernetics, Part C 38(5): 649-659 (2008)
 Lee., J. et al The activity analysis of malicious http-based botnets using
degree of periodic repeatability. In Proceedings of the IEEE International
Conference on Security Technology, December, 2008, pp.83-86.
References cont…
 X. Tan and H. Xi, Hidden semi-Markov Model for anomaly detection. Journal
of Applied Mathematics and Computation, Elsevier, vol. 205, Issue 2,
November 2008, Special Issue on Advanced Intelligent Computing Theory and
Methodology in Applied Mathematics and Computation, 2008, pp.562-567.
 Shun-Zheng Yu and Kobayashi, H. An Efficient Forward-Backward Algorithm
for an Explicit Duration Hidden Markov Model. In IEEE Signal Processing
Letters, vol.10, Issue 1, Jan. 2003, pp. 11-14
 Wang, B., Li, Z., Li, D., Liu, F. and Chen, H. Modeling Connections Behavior for
Web-Based Bots Detection. In 2nd IEEE International Conference on e-Business
and Information System Security (EBISS) - 2010, Wuhan, pp. 1-4.
 Yi Xie and Shun-Zheng Yu (2009) Monitoring the Application-Layer DDoS
Attacks for Popular Websites, In IEEE/ACM Transactions on Networking, Vol.
17, NO. 1, Feb. 2009.
2 dc meet new

More Related Content

What's hot

Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map Algorithms
Editor IJCATR
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
IJMER
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
Acad
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...
Alexander Decker
 
A44090104
A44090104A44090104
A44090104
IJERA Editor
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
IOSR Journals
 
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd Iaetsd
 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manet
csandit
 
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANETAGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
cscpconf
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
IJERA Editor
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
ijaia
 
K0815660
K0815660K0815660
K0815660
IOSR Journals
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
IJITE
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 

What's hot (14)

Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map Algorithms
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...
 
A44090104
A44090104A44090104
A44090104
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
 
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacks
 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manet
 
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANETAGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
 
K0815660
K0815660K0815660
K0815660
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 

Viewers also liked

Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
Brenton Mallen
 
Black Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysis
Roberto Suggi Liverani
 
Création d'un botnet et défense
Création d'un botnet et défenseCréation d'un botnet et défense
Création d'un botnet et défense
ESD Cybersecurity Academy
 
Botnets - Detection and Mitigation
Botnets - Detection and MitigationBotnets - Detection and Mitigation
Botnets - Detection and Mitigation
Ajit Skanda Kumaraswamy
 
The Godfather - P2P Botnets: Security & Communication
The Godfather -  P2P Botnets: Security & CommunicationThe Godfather -  P2P Botnets: Security & Communication
The Godfather - P2P Botnets: Security & Communication
ArturBalanuta
 
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
Gianluca Stringhini
 
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNSشناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
Mahdi Sayyad
 
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
Cryptovirology Introduction, SecurityThreats, Safeguards and CountermeasuresCryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
M Mehdi Ahmadian
 
Barcamp2015 cyberguerre et-botnet
Barcamp2015 cyberguerre et-botnetBarcamp2015 cyberguerre et-botnet
Barcamp2015 cyberguerre et-botnetBarcampCameroon
 
آشنایی با جرم‌یابی قانونی رایانه‌ای
آشنایی با جرم‌یابی قانونی رایانه‌ایآشنایی با جرم‌یابی قانونی رایانه‌ای
آشنایی با جرم‌یابی قانونی رایانه‌ای
Ramin Najjarbashi
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
Bhagath Singh Jayaprakasam
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
securityxploded
 

Viewers also liked (12)

Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
Black Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysis
 
Création d'un botnet et défense
Création d'un botnet et défenseCréation d'un botnet et défense
Création d'un botnet et défense
 
Botnets - Detection and Mitigation
Botnets - Detection and MitigationBotnets - Detection and Mitigation
Botnets - Detection and Mitigation
 
The Godfather - P2P Botnets: Security & Communication
The Godfather -  P2P Botnets: Security & CommunicationThe Godfather -  P2P Botnets: Security & Communication
The Godfather - P2P Botnets: Security & Communication
 
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
 
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNSشناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
 
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
Cryptovirology Introduction, SecurityThreats, Safeguards and CountermeasuresCryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
 
Barcamp2015 cyberguerre et-botnet
Barcamp2015 cyberguerre et-botnetBarcamp2015 cyberguerre et-botnet
Barcamp2015 cyberguerre et-botnet
 
آشنایی با جرم‌یابی قانونی رایانه‌ای
آشنایی با جرم‌یابی قانونی رایانه‌ایآشنایی با جرم‌یابی قانونی رایانه‌ای
آشنایی با جرم‌یابی قانونی رایانه‌ای
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
 

Similar to 2 dc meet new

Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
Acad
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET Journal
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
idescitation
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City Applications
PayamBarnaghi
 
Performance evaluation of botnet detection using machine learning techniques
Performance evaluation of botnet detection using machine learning techniquesPerformance evaluation of botnet detection using machine learning techniques
Performance evaluation of botnet detection using machine learning techniques
IJECEIAES
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
Alexander Decker
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
 
Machine learning for internet of things classification using network traffic ...
Machine learning for internet of things classification using network traffic ...Machine learning for internet of things classification using network traffic ...
Machine learning for internet of things classification using network traffic ...
IJECEIAES
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
Akshay Bansal
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET Journal
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnets
Acad
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
IRJET Journal
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
International Journal of Innovation Engineering and Science Research
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
nabati
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 

Similar to 2 dc meet new (20)

Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City Applications
 
Performance evaluation of botnet detection using machine learning techniques
Performance evaluation of botnet detection using machine learning techniquesPerformance evaluation of botnet detection using machine learning techniques
Performance evaluation of botnet detection using machine learning techniques
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Machine learning for internet of things classification using network traffic ...
Machine learning for internet of things classification using network traffic ...Machine learning for internet of things classification using network traffic ...
Machine learning for internet of things classification using network traffic ...
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnets
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 

Recently uploaded

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 

Recently uploaded (20)

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 

2 dc meet new

  • 1. Study and Analysis of botnets and botnet detection Techniques Candidate : G.Kirubavathi Reg No : 71010112041 Guide : Dr.R.Anitha Associate Professor Department of Applied Mathematics and Computational Sciences PSG College of Technology
  • 2. Outline  Introduction  Botnet Detection  HTTP Botnet Detection  Future Work  Conclusions  References
  • 3. What is the need for Botnet Detection?  Aug 4 2010 - Zeus v2 Botnet that owned 100,000 UK PCs taken out  Aug 12 2010 - Zeus v3 botnet raid on UK bank accounts  In 2013, Chameleon Botnet' takes $6-million-a-month in ad money  Word press hit by large scale botnet attack 5th April 2013. 3
  • 4. Botnet  Bot is a self propagating application that infects vulnerable host through direct exploitation or Trojan insertion.  A Botnet consists of a network of compromised computers (“bots”) controlled by an attacker (“botmaster”)  Botnets are classified as,  IRC Botnet  HTTP Botnet  P2P Botnet based on the communication protocol,
  • 5. Classification of Botnet Detection Techniques Honey nets Intrusion Detection System Signature Based Anomaly Based Host Based Network Based Active Monitoring Passive Monitoring
  • 6. HTTP Botnet Detection using Adaptive Learning Rate MLFF-NN  Recent botnets have begun using common protocols such as HTTP  HTTP bot communications are based on TCP connections  TCP related features have been identified for the detection of HTTP botnets
  • 7. Proposed System Architecture Network Traffic Feature Extraction Normalization Pre-processing Neural Network Classifier Training Set Testing Set NN Training NN Model Evalu ate Normal Bot
  • 8. Traces of different Web-based Bonets Bot Family Trace Size Packets Number Zeus-1 5.85 MB 53,220 Zeus -2 4.13 MB 37,252 Spyeye -1 25.17 MB 1,75,870 Spyeye -2 3.90 MB 35,180
  • 9. Identification accuracy of web botnet traffic profiles Traffic Traces # neurons in the ip layer # neurons in the hidden layer Correct Identification Spyeye -1 6 18 99.03% Spyeye- 2 6 18 99.02% Zeus -1 6 18 99.01% Zeus -2 6 18 99.04%
  • 10. Performance Measures of Spyeye Botnet Method Precision Recall F-Measure Accuracy Decision Tree 0.968 0.931 0.949 96.5333 Random Forest 0.968 0.934 0.950 96.667 RBF 0.976 0.927 0.950 96.5333 FF NN 0.964 0.983 0.973 99.03
  • 11. ROC curve for Spyeye Botnet
  • 12. Performance Measures of Zeus Botnet Method Precision Recall F-Measure Accuracy Decision Tree 0.956 0.930 0.941 96.14333 Random Forest 0.952 0.930 0.940 96.000 RBF 0.959 0.922 0.940 95.8667 FF NN 0.948 0.992 0.969 99.04
  • 13. ROC curve for Zeus Botnet
  • 14. Comparison of Performance Method Average Detection Accuracy Gu et al (2008), BotMiner – Data mining Techniques 96.825 Nogueira et al. (2010), Neural Networks 94.9175 Adaptive Learning Neural Networks – Proposed 99.025
  • 15. HTTP Botnet Detection using HsMM with SNMP MIB Variables  Used Hidden semi-Markov chain Model (HsMM) to characterize the normal network behavior of the TCP based MIB variables as observed sequence.  Forward-backward algorithm for estimating model parameters
  • 16. Proposed System Architecture Extraction of the SNMP MIB Variables Feature Reduction by PCA HsMM Modeling Summation of the SNMP MIB Variables Train Data Test Data Forward Backward Algorithm HsMM Model AL LNormal Bot
  • 17. Model Construction  Construct a HsMM to build a profile of normal MIB traffic behavior and use this model to detect the botnet.  A HsMM can be described as  λ = (N, M,V, A, B, П) where  N is the size of the state space Ф = {0,1}  V = {v0, v1, …, vM-1} is the set of all visible symbols which are nothing but the TCP-MIB variables.  M is the number of all visible symbols is the summation count of the MIB variables  A = [aij]NXN is the state transition probability matrix  The state transition probability matrix A, Assume A= initially, the process is normal no matter what current state is, the process will transfer to normal state next time by probability 1.  where aij = P{next_state = j | current state = i}, where i, j ϵ Ф       01 01
  • 18. Model Construction Cont…  B = {bi(k)}, i ϵ Ф, 1 ≤ k ≤ M, is the distribution of visible symbols V, where bi(k)= P{observed system behavior = vk | current state i}  П = [П0, П1, П2, …, ПN-1] is the initial state distribution
  • 19. Web-based botnet identification Accuracy Datasets False +ve Rate Detection Accuracy Results Web Service 0% 100% Normal FTP Service 0% 100% Normal Spyeye 1.33% 98.67% Malicious Botnet Black energy 1.28% 98.72% Malicious Botnet
  • 20. Future Work  Analyzing the various types of current botnet activities.  Identify the suitable statistical modeling techniques to detect the botnet irrespective of their communication protocols and Command and Control structures
  • 21. Conclusion  Botnets pose a significant and growing threat against cyber security  It provides key platform for many cyber crimes like DDOS, etc  As network security has become integral part of our life and botnets have become the most serious threat to it  It is very important to detect botnet attack and find the solution for it
  • 22. Published Paper G.Kirubavathi Venkatesh and R.Anitha, “HTTP Botnet Detection using Adaptive learning Rate Multilayer Feed-forward Neural Network”. In Proceedings of international workshop in information security theory and practice – WISTP’12, UK, 2012, LNCS 7322, pp. 38-48, 2012. Paper Communicated  G.Kirubavathi Venkatesh, V.Srihari, R.Veeramani, RM. Karthikeyan, R.Anitha “HTTP botnet Detection using Hidden semi-Markov Model with SNMP MIB variables”, has been communicated to the International journal of Security and Communication Networks (Wiley publication).
  • 23. References P. Barford and V. Yegneswaran, “An inside look at botnets,” Springer Verlag, 2006.  J. Binkley and S. Singh. “An algorithm for anomaly-based botnet detection”, In Proceedings of USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), pages 43–48, 2006.  T.Abbes, A.A.Bouhoula, and, M.Rusinowitch, “Protocol Analysis in Intrusion Detection Using Decision Tree”, Proc. International Conference on Information Technology, Coding and Computing (ITCC,04) IEEE Xplore, Pages 404-408.  Jiong Zhang, Mohammad Zulkernine, Anwar Haque: Random-Forests- Based Network Intrusion Detection Systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(5): 649-659 (2008)  Lee., J. et al The activity analysis of malicious http-based botnets using degree of periodic repeatability. In Proceedings of the IEEE International Conference on Security Technology, December, 2008, pp.83-86.
  • 24. References cont…  X. Tan and H. Xi, Hidden semi-Markov Model for anomaly detection. Journal of Applied Mathematics and Computation, Elsevier, vol. 205, Issue 2, November 2008, Special Issue on Advanced Intelligent Computing Theory and Methodology in Applied Mathematics and Computation, 2008, pp.562-567.  Shun-Zheng Yu and Kobayashi, H. An Efficient Forward-Backward Algorithm for an Explicit Duration Hidden Markov Model. In IEEE Signal Processing Letters, vol.10, Issue 1, Jan. 2003, pp. 11-14  Wang, B., Li, Z., Li, D., Liu, F. and Chen, H. Modeling Connections Behavior for Web-Based Bots Detection. In 2nd IEEE International Conference on e-Business and Information System Security (EBISS) - 2010, Wuhan, pp. 1-4.  Yi Xie and Shun-Zheng Yu (2009) Monitoring the Application-Layer DDoS Attacks for Popular Websites, In IEEE/ACM Transactions on Networking, Vol. 17, NO. 1, Feb. 2009.