Detecting stealthy P2P botnets using statistical traffic fingerprints (original) (raw)

A HOST-BASED P2P HOST IDENTIFICATION APPROACH WITH FLOW-BASED IN DETECTION OF P2P BOTS

Dr. Ramesh G

Tianjin Daxue/Tianjin University, 2022

View PDFchevron_right

Building a Scalable System for Stealthy P2P-Botnet Detection

International Journal of Scientific Research in Science, Engineering and Technology IJSRSET

View PDFchevron_right

Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour

Robiah Yusof

2011

View PDFchevron_right

A proposed framework for P2P botnet detection

azizah Abdul Manaf

2010

View PDFchevron_right

Towards automated detection of peer-to-peer botnets: on the limits of local approaches

Vilmos Bilicki

Proceedings of the 2nd Usenix Conference on Large Scale Exploits and Emergent Threats Botnets Spyware Worms and More, 2009

View PDFchevron_right

Group Behavior Metrics for P2P Botnet Detection

John Felix

Information and Communications Security, 2012

View PDFchevron_right

Behavioural Correlation for Detecting P2P Bots

Uwe Aickelin

2010 Second International Conference on Future Networks, 2010

View PDFchevron_right

Survey of Peer-to-Peer Botnets and Detection Frameworks

Ramesh Singh Rawat

Int. J. Netw. Secur., 2018

View PDFchevron_right

Automated Simulation P2P Botnets Signature Detection by Rule-based Approach

Zul azri

International Journal of Advanced Computer Science and Applications, 2016

View PDFchevron_right

BotGrep: finding P2P bots with structured graph analysis

Nikita Borisov

Proceedings of the 19th …, 2010

View PDFchevron_right

P2P-BDS: Peer-2-Peer Botnet Detection System

Christy Sam

IOSR Journal of Computer Engineering, 2014

View PDFchevron_right

Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Classification

International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2018

View PDFchevron_right

A NOVEL BOTNET DETECTION SYSTEM TO IDENTIFY RESILIENT P2P - BOTNET

IJESRT JOURNAL

View PDFchevron_right

Flow-Based Identification of P2P Heavy-Hitters

Bernhard Plattner

International Conference on Internet Surveillance and Protection (ICISP’06), 2006

View PDFchevron_right

Enhanced PeerHunter: Detecting Peer-to-peer Botnets through Network-Flow Level Community Behavior Analysis

Di Zhuang

IEEE Transactions on Information Forensics and Security

View PDFchevron_right

P2P and P2P botnet traffic classification in two stages

Wujian Ye

Soft Computing, 2015

View PDFchevron_right

Analysis and Improvement Design on P2P Botnets Detection Framework

Robiah Yusof

View PDFchevron_right

Identification of P2P Flows Through Host Activity

Sakir Sezer

Proceedings of the 6th International ICST Conference on Broadband Communications, Networks, and Systems, 2009

View PDFchevron_right

Multivariate Statistical Analysis on Anomaly P2P Botnets Detection

Zul azri

International Journal of Advanced Computer Science and Applications, 2017

View PDFchevron_right

Peer-to-Peer Botnet Investigation: A Review

Mark Scanlon

Proc of. 6th International Symposium on Digital Forensics and Information Security (DFIS-2012)

View PDFchevron_right

Identifying P2P Heavy-Hitters from Network-Flow Data

Bernhard Plattner

View PDFchevron_right

A Survey On Botnet Detection Approaches In Peer-To-Peer Network

WARSE The World Academy of Research in Science and Engineering

International Journal of Advances in Computer Science and Technology

View PDFchevron_right

A Review of Peer-To-Peer Botnet Detection Techniques

Selvakumar Manickam

Journal of Computer Science, 2014

View PDFchevron_right

Detecting P2P traffic from the P2P flow graph

Stephan Bohacek

2011 7th International Wireless Communications and Mobile Computing Conference, 2011

View PDFchevron_right

Heuristic-Based Real-Time P2P Traffic Identification

jagan mohan reddy

2015 International Conference on Emerging Information Technology and Engineering Solutions, 2015

View PDFchevron_right

A Novel Botnet Detection System for P2P Networks

Mohammad Bawaneh

J. Comput. Sci., 2017

View PDFchevron_right

Identification and Analysis of Peer-to-Peer Traffic

Trang Dang

Journal of Communications, 2006

View PDFchevron_right

Detecting P2P botnets through network behavior analysis and machine learning

Bassam Sayed, Sherif Saad

2011 Ninth Annual International Conference on Privacy, Security and Trust, 2011

View PDFchevron_right

Profiling and identification of P2P traffic

Dah Ming Chiu

2009

View PDFchevron_right

PeerHunter: Detecting peer-to-peer botnets through community behavior analysis

Di Zhuang

2017 IEEE Conference on Dependable and Secure Computing

View PDFchevron_right