Design, deployment and use of HTTP-based botnet (HBB) testbed

Esraa Alomari, S. Manickam, B. Gupta, Parminder Singh, Mohammed Anbar
{"title":"Design, deployment and use of HTTP-based botnet (HBB) testbed","authors":"Esraa Alomari, S. Manickam, B. Gupta, Parminder Singh, Mohammed Anbar","doi":"10.1109/ICACT.2014.6779162","DOIUrl":null,"url":null,"abstract":"Botnet is one of the most widespread and serious malware which occur frequently in today's cyber attacks. A botnet is a group of Internet-connected computer programs communicating with other similar programs in order to perform various attacks. HTTP-based botnet is most dangerous botnet among all the different botnets available today. In botnets detection, in particularly, behavioural-based approaches suffer from the unavailability of the benchmark datasets and this lead to lack of precise results evaluation of botnet detection systems, comparison, and deployment which originates from the deficiency of adequate datasets. Most of the datasets in the botnet field are from local environment and cannot be used in the large scale due to privacy problems and do not reflect common trends, and also lack some statistical features. To the best of our knowledge, there is not any benchmark dataset available which is infected by HTTP-based botnet (HBB) for performing Distributed Denial of Service (DDoS) attacks against Web servers by using HTTP-GET flooding method. In addition, there is no Web access log infected by botnet is available for researchers. Therefore, in this paper, a complete test-bed will be illustrated in order to implement a real time HTTP-based botnet for performing variety of DDoS attacks against Web servers by using HTTP-GET flooding method. In addition to this, Web access log with http bot traces are also generated. These real time datasets and Web access logs can be useful to study the behaviour of HTTP-based botnet as well as to evaluate different solutions proposed to detect HTTP-based botnet by various researchers.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"16th International Conference on Advanced Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2014.6779162","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29

Abstract

Botnet is one of the most widespread and serious malware which occur frequently in today's cyber attacks. A botnet is a group of Internet-connected computer programs communicating with other similar programs in order to perform various attacks. HTTP-based botnet is most dangerous botnet among all the different botnets available today. In botnets detection, in particularly, behavioural-based approaches suffer from the unavailability of the benchmark datasets and this lead to lack of precise results evaluation of botnet detection systems, comparison, and deployment which originates from the deficiency of adequate datasets. Most of the datasets in the botnet field are from local environment and cannot be used in the large scale due to privacy problems and do not reflect common trends, and also lack some statistical features. To the best of our knowledge, there is not any benchmark dataset available which is infected by HTTP-based botnet (HBB) for performing Distributed Denial of Service (DDoS) attacks against Web servers by using HTTP-GET flooding method. In addition, there is no Web access log infected by botnet is available for researchers. Therefore, in this paper, a complete test-bed will be illustrated in order to implement a real time HTTP-based botnet for performing variety of DDoS attacks against Web servers by using HTTP-GET flooding method. In addition to this, Web access log with http bot traces are also generated. These real time datasets and Web access logs can be useful to study the behaviour of HTTP-based botnet as well as to evaluate different solutions proposed to detect HTTP-based botnet by various researchers.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于http的僵尸网络(HBB)测试平台的设计、部署和使用
僵尸网络是当今网络攻击中最常见、最严重的恶意软件之一。僵尸网络是一组连接互联网的计算机程序,它们与其他类似的程序进行通信,以执行各种攻击。基于http的僵尸网络是当今所有可用的不同僵尸网络中最危险的僵尸网络。特别是在僵尸网络检测中,基于行为的方法受到基准数据集不可用的影响,这导致缺乏对僵尸网络检测系统,比较和部署的精确结果评估,这源于缺乏足够的数据集。僵尸网络领域的数据集大多来自局部环境,由于隐私问题无法大规模使用,不能反映共同趋势,也缺乏一些统计特征。据我们所知,没有任何可用的基准数据集被基于http的僵尸网络(HBB)感染,通过使用HTTP-GET泛洪方法对Web服务器执行分布式拒绝服务(DDoS)攻击。此外,也没有被僵尸网络感染的Web访问日志可供研究人员使用。因此,在本文中,为了实现一个实时的基于http的僵尸网络,通过使用HTTP-GET泛洪方法对Web服务器执行各种DDoS攻击,将展示一个完整的测试平台。除此之外,还会生成带有http bot跟踪的Web访问日志。这些实时数据集和Web访问日志可以用于研究基于http的僵尸网络的行为,以及评估各种研究人员提出的基于http的僵尸网络检测的不同解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Lightweight Group Key Establishment for Reducing Memory Overhead Graphed-based K-Means and Shortest Distance Tree for the Construction of Elderly Safe Corridor Accident and Prevention Platform A Blockchain based Security Information and Event Monitoring Framework Trustworthy Software Development - practical view of security processes through MVP methodology A Review of Gateway Load Balancing Methods in Connecting MANET into Internet
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1