Abstract
Recently cyber-attacks in Internet using botnets have been increased. Also, crimes involved in monetary profits through cyber-attacks have been continuously increased. Attackers can use P2P botnets to launch various attacks such as Distributed Denial of Service (DDoS), malware propagation, and so on. For this reason, P2P botnet detection techniques have been studied. This paper is a survey of P2P botnet detection, and describes about the general type of P2P botnets and detection methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Freiling F, Holz T, Wicherski G (2005) Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks. In: Proceedings of the 10th European symposium on research in computer security. pp 319–335
Zhu Z, Lu G, Chen Y, Fu ZJ, Roberts P, Han K (2008) Botnet research survey. In: Proceedings of the 32nd annual IEEE international conference on computer software and applications. pp 967–972
Choi H, Lee H, Lee H, Kim H (2007) Botnet detection by monitoring group activities in DNS traffic. In: Proceedings of the 7th IEEE international conference on computer and information technology. pp 715–720
Ha DT, Yan G, Eidenbenz S, Ngo HQ (2009) On the effectiveness of structural detection and defense against P2P-based botnets. In: Proceedings of the 39th annual IEEElIFIP international conference on dependable systems and networks, pp 297–306
Liao W, Chang C (2010) Peer to peer botnet detection using data mining scheme. In: Proceedings of the international conference on internet technology and applications, pp 1–4
Noh SK, Oh JH, Lee JS, Noh BN, Jeong HC (2009) “Detecting P2P botnets using a multi-phased flow model. In: Proceedings of the 3rd international conference on digital society IEEE, pp 247–253
Han KS, Lim KH, Im EG (2009) The Traffic Analysis of P2P-based Storm Botnet using Honeynet. J KIISC 19(4):51–61
Liu D, Li Y, Hu Y, Liang Z (2010) A P2P-botnet detection model and algorithms based on network streams analysis. In: Proceedings of the international conference on future information technology and management engineering, pp 55–58
Saad S, Traore I, Ghorbani A, Sayed B, Zhao D, Lu W, elix J, Hakimian P (2011) “Detecting P2P botnets through network behavior analysis and machine learning. In: Proceedings of the 9th annual international conference on privacy, security and trust, pp 174–180
Gu G, Perdisci R, Zhang J, Lee W (2008) BotMiner: clustering Analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th conference on security symposium, pp 139–154
Zhang J, Perdisci R, Lee W, Sarfraz U, Luo X (2011) Detecting stealthy P2P botnets using statistical traffic fingerprints. In: IEEE/IFIP 41st international conference on dependable systems and networks, pp 121–132
Acknowledgments
This work was supported by the Mid-career Researcher Program of the NRF grant funded by the MEST (NRF 2010-1179-000).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Han, KS., Im, E.G. (2012). A Survey on P2P Botnet Detection. In: Kim, K., Ahn, S. (eds) Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, vol 120. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2911-7_56
Download citation
DOI: https://doi.org/10.1007/978-94-007-2911-7_56
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2910-0
Online ISBN: 978-94-007-2911-7
eBook Packages: EngineeringEngineering (R0)