A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means

2015 ◽  
Vol 6 (1) ◽  
pp. 1-30 ◽  
Author(s):  
Shing-Han Li ◽  
Yu-Cheng Kao ◽  
Zong-Cyuan Zhang ◽  
Ying-Ping Chuang ◽  
David C. Yen
Author(s):  
Myint Soe Khaing ◽  
Yee Mon Thant ◽  
Thazin Tun ◽  
Chaw Su Htwe ◽  
Mie Mie Su Thwin

2013 ◽  
Vol 7 (11) ◽  
pp. 1849-1859 ◽  
Author(s):  
Kuochen Wang ◽  
Chun-Ying Huang ◽  
Li-Yang Tsai ◽  
Ying-Dar Lin

Author(s):  
Noor Zuraidin Mohd Safar ◽  
Noryusliza Abdullah ◽  
Hazalila Kamaludin ◽  
Suhaimi Abd Ishak ◽  
Mohd Rizal Mohd Isa

<span>Developments in computer networking have raised concerns of the associated Botnets threat to the Internet security. Botnet is an inter-connected computers or nodes that infected with malicious software and being controlled as a group without any permission of the computer’s owner. <br /> This paper explores how network traffic characterising can be used for identification of botnet at local networks. To analyse the characteristic, behaviour or pattern of the botnet in the network traffic, a proper network analysing tools is needed. Several network analysis tools available today are used for the analysis process of the network traffic. In the analysis phase, <br /> the botnet detection strategy based on the signature and DNS anomaly approach are selected to identify the behaviour and the characteristic of the botnet. In anomaly approach most of the behavioural and characteristic identification of the botnet is done by comparing between the normal and anomalous traffic. The main focus of the network analysis is studied on UDP protocol network traffic. Based on the analysis of the network traffic, <br /> the following anomalies are identified, anomalous DNS packet request, <br /> the NetBIOS attack, anomalous DNS MX query, DNS amplification attack and UDP flood attack. This study, identify significant Botnet characteristic in local network traffic for UDP network as additional approach for Botnet detection mechanism.</span>


2014 ◽  
Vol 11 (6) ◽  
pp. 551-566
Author(s):  
MeongJae Seong ◽  
Haeryong Park ◽  
Bomin Choi ◽  
Eul Gyu Im

Sign in / Sign up

Export Citation Format

Share Document