Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Kuochen | en_US |
dc.contributor.author | Huang, Chun-Ying | en_US |
dc.contributor.author | Tsai, Li-Yang | en_US |
dc.contributor.author | Lin, Ying-Dar | en_US |
dc.date.accessioned | 2019-04-03T06:40:35Z | - |
dc.date.available | 2019-04-03T06:40:35Z | - |
dc.date.issued | 2014-11-01 | en_US |
dc.identifier.issn | 1939-0114 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1002/sec.898 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/123955 | - |
dc.description.abstract | Botnet has become one major Internet security issue in recent years. Although signature-based solutions are accurate, it is not possible to detect bot variants in real-time. In this paper, we propose behavior-based botnet detection in parallel (BBDP). BBDP adopts a fuzzy pattern recognition approach to detect bots. It detects a bot based on anomaly behavior in domain name service (DNS) queries and transmission control protocol (TCP) requests. With the design objectives of being efficient and accurate, a bot is detected using the proposed five-stage process, including: (i) traffic reduction, which shrinks an input trace by deleting unnecessary packets; (ii) feature extraction, which extracts features from a shrunk trace; (iii) data partitioning, which divides features into smaller pieces; (iv) DNS detection phase, which detects bots based on DNS features; and (v) TCP detection phase, which detects bots based on TCP features. The detection phases, which consume approximately 90% of the total detection time, can be dispatched to multiple servers in parallel and make detection in real-time. The large scale experiments with the Windows Azure cloud service show that BBDP achieves a high true positive rate (95%+) and a low false positive rate (approximate to 3%). Meanwhile, experiments also show that the performance of BBDP can scale up linearly with the number of servers used to detect bots. Copyright (c) 2013 John Wiley & Sons, Ltd. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | anomaly detection | en_US |
dc.subject | behavior-based | en_US |
dc.subject | botnet detection | en_US |
dc.subject | cloud computing | en_US |
dc.subject | fuzzy pattern recognition | en_US |
dc.subject | parallel process | en_US |
dc.title | Behavior-based botnet detection in parallel | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1002/sec.898 | en_US |
dc.identifier.journal | SECURITY AND COMMUNICATION NETWORKS | en_US |
dc.citation.volume | 7 | en_US |
dc.citation.issue | 11 | en_US |
dc.citation.spage | 1849 | en_US |
dc.citation.epage | 1859 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000344322100016 | en_US |
dc.citation.woscount | 4 | en_US |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.