Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 120))

Abstract

Recently cyber-attacks in Internet using botnets have been increased. Also, crimes involved in monetary profits through cyber-attacks have been continuously increased. Attackers can use P2P botnets to launch various attacks such as Distributed Denial of Service (DDoS), malware propagation, and so on. For this reason, P2P botnet detection techniques have been studied. This paper is a survey of P2P botnet detection, and describes about the general type of P2P botnets and detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Freiling F, Holz T, Wicherski G (2005) Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks. In: Proceedings of the 10th European symposium on research in computer security. pp 319–335

    Google Scholar 

  2. Zhu Z, Lu G, Chen Y, Fu ZJ, Roberts P, Han K (2008) Botnet research survey. In: Proceedings of the 32nd annual IEEE international conference on computer software and applications. pp 967–972

    Google Scholar 

  3. Choi H, Lee H, Lee H, Kim H (2007) Botnet detection by monitoring group activities in DNS traffic. In: Proceedings of the 7th IEEE international conference on computer and information technology. pp 715–720

    Google Scholar 

  4. Ha DT, Yan G, Eidenbenz S, Ngo HQ (2009) On the effectiveness of structural detection and defense against P2P-based botnets. In: Proceedings of the 39th annual IEEElIFIP international conference on dependable systems and networks, pp 297–306

    Google Scholar 

  5. Liao W, Chang C (2010) Peer to peer botnet detection using data mining scheme. In: Proceedings of the international conference on internet technology and applications, pp 1–4

    Google Scholar 

  6. Noh SK, Oh JH, Lee JS, Noh BN, Jeong HC (2009) “Detecting P2P botnets using a multi-phased flow model. In: Proceedings of the 3rd international conference on digital society IEEE, pp 247–253

    Google Scholar 

  7. Han KS, Lim KH, Im EG (2009) The Traffic Analysis of P2P-based Storm Botnet using Honeynet. J KIISC 19(4):51–61

    Google Scholar 

  8. Liu D, Li Y, Hu Y, Liang Z (2010) A P2P-botnet detection model and algorithms based on network streams analysis. In: Proceedings of the international conference on future information technology and management engineering, pp 55–58

    Google Scholar 

  9. Saad S, Traore I, Ghorbani A, Sayed B, Zhao D, Lu W, elix J, Hakimian P (2011) “Detecting P2P botnets through network behavior analysis and machine learning. In: Proceedings of the 9th annual international conference on privacy, security and trust, pp 174–180

    Google Scholar 

  10. Gu G, Perdisci R, Zhang J, Lee W (2008) BotMiner: clustering Analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th conference on security symposium, pp 139–154

    Google Scholar 

  11. Zhang J, Perdisci R, Lee W, Sarfraz U, Luo X (2011) Detecting stealthy P2P botnets using statistical traffic fingerprints. In: IEEE/IFIP 41st international conference on dependable systems and networks, pp 121–132

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Mid-career Researcher Program of the NRF grant funded by the MEST (NRF 2010-1179-000).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eul Gyu Im .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this paper

Cite this paper

Han, KS., Im, E.G. (2012). A Survey on P2P Botnet Detection. In: Kim, K., Ahn, S. (eds) Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, vol 120. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2911-7_56

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2911-7_56

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2910-0

  • Online ISBN: 978-94-007-2911-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics