{"title":"Botnet detecting method based on activity similarity","authors":"Wan Wei, Ling Jun","doi":"10.1109/ICIST.2014.6920405","DOIUrl":null,"url":null,"abstract":"Botnet as a new technology of attacks is a serious threat to Internet security. With the rapid development of the botnet, botnet based several protocols came into being. In accordance with the activity similarity of botnet, a method has application in botnet detection. Firstly, according to the situation and problems of the botnet recently, the life cycle and behavior characteristics of the botnet have been analyzed. After that a method based on activity similarity has been research to detect if a node is in a botnet. Finally, we analyzed and summarized the experimental results, and verified the reliability and rationality of the detection method.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 4th IEEE International Conference on Information Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIST.2014.6920405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Botnet as a new technology of attacks is a serious threat to Internet security. With the rapid development of the botnet, botnet based several protocols came into being. In accordance with the activity similarity of botnet, a method has application in botnet detection. Firstly, according to the situation and problems of the botnet recently, the life cycle and behavior characteristics of the botnet have been analyzed. After that a method based on activity similarity has been research to detect if a node is in a botnet. Finally, we analyzed and summarized the experimental results, and verified the reliability and rationality of the detection method.