PeerHunter: Detecting peer-to-peer botnets through community behavior analysis
Title | PeerHunter: Detecting peer-to-peer botnets through community behavior analysis |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Zhuang, D., Chang, J. M. |
Conference Name | 2017 IEEE Conference on Dependable and Secure Computing |
ISBN Number | 978-1-5090-5569-2 |
Keywords | botnets, community behavior analysis based method, compositionality, Computer crime, computer network security, cyber-crimes, Electronic mail, feature extraction, IP networks, Metrics, mutual contacts, Network security, P2P botnets, P2P hosts detection component, peer-to-peer botnets, Peer-to-peer computing, PeerHunter, potential botnet communities, Protocols, pubcrawl, Resiliency |
Abstract | Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the infrastructure that responsible for various of cyber-crimes. Though a few existing work claimed to detect traditional botnets effectively, the problem of detecting P2P botnets involves more challenges. In this paper, we present PeerHunter, a community behavior analysis based method, which is capable of detecting botnets that communicate via a P2P structure. PeerHunter starts from a P2P hosts detection component. Then, it uses mutual contacts as the main feature to cluster bots into communities. Finally, it uses community behavior analysis to detect potential botnet communities and further identify bot candidates. Through extensive experiments with real and simulated network traces, PeerHunter can achieve very high detection rate and low false positives. |
URL | https://ieeexplore.ieee.org/document/8073832 |
DOI | 10.1109/DESEC.2017.8073832 |
Citation Key | zhuang_peerhunter:_2017 |
- mutual contacts
- Resiliency
- pubcrawl
- Protocols
- potential botnet communities
- PeerHunter
- Peer-to-peer computing
- peer-to-peer botnets
- P2P hosts detection component
- P2P botnets
- network security
- botnets
- Metrics
- IP networks
- feature extraction
- Electronic mail
- cyber-crimes
- computer network security
- Computer crime
- Compositionality
- community behavior analysis based method