Abstract
Botnets have become one of the most solemn threats to Internet security. Botnets comprises over a network of infected nodes known as ‘bot’. Bots are controlled by human operators (botmasters). Random nature of Peer-to-Peer botnets has influenced sinkhole researchers to compromise over occupation of hunted command and control in a complex manner and due to variable nature of action, they are often good deserters. In this paper, we present a design of an advanced hyper-efficient mechanism which has the ability to pursue Peer-to-Peer randomized botnets. It provides capacity to detain targeted sinkholes and identify arbitrary execution of contagion in infected nodes. In the end, method acquires the composition of different cubic formations for proper lookup of random natured Peer-to-Peer botnets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Grizzard, J.B., et al.: Peer-to-peer botnets: overview and case study. In: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets (2007)
Puri, R.: Bots & botnet: an overview. SANS Institute 2003 (2003)
McCarty, B.: Botnets: big and bigger. IEEE Secur. Priv. 1(4), 87–90 (2003)
Arce, I., Levy, E.: An analysis of the slapper worm. IEEE Secur. Priv. Mag. 1, 82–87 (2003)
Zhou, Y., Xuxian J.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy (SP). IEEE (2012)
Zeng, J., Tang, W., Liu, C., Hu, J., Peng, L.: Efficient detect scheme of botnet command and control communication. In: Liu, C., Wang, L., Yang, A. (eds.) ICICA 2012, Part I. CCIS, vol. 307, pp. 576–581. Springer, Heidelberg (2012)
Rodríguez-Gómez, R.A., Maciá-Fernández, G., GarcíaTeodoro, P.: Survey and taxonomy of botnet research through lifecycle. ACM Comput. Surv. (CSUR) 45, 45 (2013)
Narang, P., Reddy, J.M., Hota, C.: Feature selection for detection of peer-to-peer botnet traffic. In: Proceedings of the 6th ACM India Computing Convention. ACM (2013)
Li, H., et al.: Modeling to understand P2P botnets. In: IEEE Second International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC) (2012)
Han, K.-S., Im, E.G.: A Survey on P2P Botnet Detection. In: Kim, K.J., Ahn, S.J. (eds.) Proceedings of the International Conference on IT Convergence and Security 2011. LNEE, vol. 120, pp. 589–593. Springer, Heidelberg (2012)
Xu, Z., et al.: Utilizing enemies’ P2P strength against them. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (2012)
Lu, C., Brooks, R.R.: P2P hierarchical botnet traffic detection using hidden markov models. In: Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results. ACM (2012)
Greengard, S.: The war against botnets. Commun. ACM 55, 16–18 (2012)
Dave, V., Guha, S., Zhang, Y.: ViceROI: catching click-spam in search ad networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)
Wichmann, A., Gerhards-Padilla, E.: Using infection markers as a vaccine against malware attacks. In: IEEE International Conference on Green Computing and Communications (GreenCom), pp. 737–742, 20–23 November 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Siddiqui, I.F., Faseeh, N.M., Lee, S.UJ., Unar, M.A. (2014). An Advanced Hyper-Efficient Design to Detect Random Peer-to-Peer Botnets. In: Shaikh, F., Chowdhry, B., Zeadally, S., Hussain, D., Memon, A., Uqaili, M. (eds) Communication Technologies, Information Security and Sustainable Development. IMTIC 2013. Communications in Computer and Information Science, vol 414. Springer, Cham. https://doi.org/10.1007/978-3-319-10987-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-10987-9_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10986-2
Online ISBN: 978-3-319-10987-9
eBook Packages: Computer ScienceComputer Science (R0)