DSpace Repository

PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification

Show simple item record

dc.contributor.author Narang, Pratik
dc.date.accessioned 2023-01-06T07:09:27Z
dc.date.available 2023-01-06T07:09:27Z
dc.date.issued 2014-10
dc.identifier.uri https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-014-0015-3
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8341
dc.description.abstract The distributed and decentralized nature of peer-to-peer (P2P) networks has offered a lucrative alternative to bot-masters to build botnets. P2P botnets are not prone to any single point of failure and have been proven to be highly resilient against takedown attempts. Moreover, smarter bots are stealthy in their communication patterns and elude the standard discovery techniques which look for anomalous network or communication behavior. In this paper, we present a methodology to detect P2P botnet traffic and differentiate it from benign P2P traffic in a network. Our approach neither assumes the availability of any ‘seed’ information of bots nor relies on deep packet inspection. It aims to detect the stealthy behavior of P2P botnets. That is, we aim to detect P2P botnets when they lie dormant (to evade detection by intrusion detection systems) or while they perform malicious activities (spamming, password stealing, etc.) in a manner which is not observable to a network administrator. Our approach PeerShark combines the benefits of flow-based and conversation-based approaches with a two-tier architecture, and addresses the limitations of these approaches. By extracting statistical features from the network traces of P2P applications and botnets, we build supervised machine learning models which can accurately differentiate between benign P2P applications and P2P botnets. PeerShark could also detect unknown P2P botnet traffic with high accuracy. en_US
dc.language.iso en en_US
dc.publisher Springer en_US
dc.subject Computer Science en_US
dc.subject Botnets en_US
dc.subject Peer-to-peer en_US
dc.subject Machine Learning en_US
dc.subject Security en_US
dc.title PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account