International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 1 | Year 2013 | Article Id. IJCTT-V4I1P104 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I1P104

A Review on Botnet and Detection Technique


Jignesh Vania, Arvind Meniya, H. B. Jethva

Citation :

Jignesh Vania, Arvind Meniya, H. B. Jethva, "A Review on Botnet and Detection Technique," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 1, pp. 23-29, 2013. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V4I1P104

Abstract

The defining characteristic of botnets is the use of command and control channels through which they can be updated and directed. Recently malicious botnets evolve into HTTP botnets out of typical IRC botnets. Data mining algorithms allow us to automate detecting characteristics from large amount of data, which the conventional heuristics and signature based methods could not apply.

Keywords

Botnet, botnet detection, HTTP Botnet, Data Mining.

References

[1] Chung-Huang Yang , Kuang-Li Ting. Fast Deployment of Botnet Detection with Traffic Monitoring, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 856-860, 2009.
[2] Haritha S. Nair, Vinodh Ewards S E A Study on Botnet Detection Techniques, International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012
[3] Botnet scams are exploding, 2008 http://usatoday30.usatoday.com/tech/news/computersecurity/2008-03- 16-computer-botnets_n.htm.
[4] Nicholas Ianelli, Aaron Hackworth. Botnets as a Vehicle for Online Crime - CERT and CERT Coordination Center are registeredin the U.S. Patent and Trademark Office. 2005
[5] Oregon Man Cops Plea in eBay DDOS Attack, http://www.internetnews.com/security/article.php/3574101
[6] Worm strikes down Windows 2000 systems,http://www.cnn.com/2005/TECH/internet/08/16/computer.wo rm/index.html
[7] Kraken botnet, Wikipedia, http://en.wikipedia.orglwikilKraken_botnet, 2008
[8] 
Zeus botnet steals $47M from European bank customers,2012. http://news.cnet.com/8301-1009_3-57557434-83/zeus-botnet-steals$47m-from-european-bank-customers/ 
[9] Erdem Alparslan, Adem Karahoca and Dilek Karahoca. BotNet Detection: Enhancing Analysis by Using Data Mining Techniques, Downloaded from http://dx.doi.org/10.5772/48804 (BOOK) 
[10] Sonal P.Patil, Swatantra Kumar. Botnet-A Network Threat, International Conference on Recent Trends in Information Technology and Computer Science (IRCTITCS), Pages 29-35, 2011.
[11] Xiaonan Zang, Athichart Tangpong, George Kesidis and David J. Miller. Botnet Detection Through Fine Flow Classification. Departments of CS&E and EE, The Pennsylvania State University, University Park, PA, 16802. CSE Dept Technical Report No. CSE11001, Jan. 31, 2011
[12] Alireza Shahrestani, Maryam Feily, Rodina Ahmad, Sureswaran Ramadass. ARCHITECTURE FOR APPLYING DATA MINING AND VISUALIZATION ON NETWORK FLOW FOR BOTNET TRAFFIC DETECTION, International Conference on Computer Technology and Development,IEEE, Pages 33-37 2009.
[13] Zhang yanyan,Yao Yuan, Study of Database Intrusion Detection Based on Improved Association Rule Algorithm, IEEE. Pages 673676, 2010.
[14] Sajjad Arshad, Maghsoud Abbaspour, Mehdi Kharrazi, Hooman Sanatkar. An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets, Presented in International Conference on Computer Application Industrial Electronics, IEEE, Pages 564-569, 2011
[15] Wang Zilong, Wang Jinsong, Huang Wenyi, Xia Chengyi. The Detection of IRC Botnet Based on Abnormal Behavior. Second International Conference on MultiMedia and Information Technology, IEEE, Pages 146-149, 2010.
[16] J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by irc nickname evaluation In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots 07), 2007.
[17] Claudio Mazzariello. IRC traffic analysis for botnet detection, The Fourth International Conference on Information Assurance and Security, IEEE, Pages 318-323, 2008.
[18] Hossein Rouhani Zeidanloo, Mohammad Jorjor Zadeh shooshtari, Payam Vahdani Amoli, M. Safari, Mazdak Zamani. A Taxonomy of Botnet Detection Techniques, IEEE, Pages 158-162, 2010
[19] Roberto Perdiscia, Wenke Leea, and Nick Feamstera, Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces, College of Computing, Georgia Institute of Technology, Atlanta, GA 30332, USA, USENIX, 2010