Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphs

INFOCOM Workshops(2013)

引用 14|浏览13
暂无评分
摘要
In this paper we review state-of-the-art botnet detection algorithms that reveal the control traffic of malicious peer-topeer (P2P) networks by targeting topological properties of their interconnectivity graph. This class of detection methods does not rely on the exchanged content and therefore is also applicable to encrypted control traffic. However, in practice, an ISP monitoring customer traffic over an edge router will usually see only a fraction of the overall botnet, thus restricting the available bot connectivity information and limiting the applicability of general community detection approaches. In this paper we critically review graph based detection methods suitable for edge router monitoring using two types of real network traces. We show experimentally that using meta-graphs of mutual contacts proposed by Coskun et al. 2010 has the highest potential on result quality. We improve this approach by presenting a computationally less complex algorithm with similar result quality. Furthermore we explain ways to alleviate the cost of dealing with false positives in the result set.
更多
查看译文
关键词
metagraphs,Internet connection graphs,ISP,community detection approach,topological properties,cryptography,isp,customer traffic monitoring,malicious p2p networks,botnet detection algorithm,graph based detection methods,edge router monitoring,malicious peer-topeer networks,computer network security,telecommunication network topology,internet connection graphs,malicious peer-to-peer network control traffic,internet,state-of-the-art botnet detection algorithms,interconnectivity graph,bot connectivity information,malicious P2P networks,graph theory,telecommunication traffic,peer-to-peer computing,encrypted control traffic,customer traffic,content exchange
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要