A Two-stage P2P Botnet Detection Method Based on Statistical Features
Title | A Two-stage P2P Botnet Detection Method Based on Statistical Features |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Zhou, B., He, J., Tan, M. |
Conference Name | 2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS) |
Date Published | Oct. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6579-0 |
Keywords | benign P2P hosts, Botnet, botnets, composability, computer network security, detection, feature extraction, invasive software, machine learning, Metrics, Monitoring, Network security, P2P, Payloads, Peer-to-peer computing, pubcrawl, Real-time Systems, resilience, Resiliency, software engineering, statistical analysis, statistical feature, telecommunication traffic, traffic statistical features, two-stage P2P botnet detection method, unsolicited e-mail |
Abstract | P2P botnet has become one of the most serious threats to today's network security. It can be used to launch kinds of malicious activities, ranging from spamming to distributed denial of service attack. However, the detection of P2P botnet is always challenging because of its decentralized architecture. In this paper, we propose a two-stage P2P botnet detection method which only relies on several traffic statistical features. This method first detects P2P hosts based on three statistical features, and then distinguishes P2P bots from benign P2P hosts by means of another two statistical features. Experimental evaluations on real-world traffic datasets shows that our method is able to detect hidden P2P bots with a detection accuracy of 99.7% and a false positive rate of only 0.3% within 5 minutes. |
URL | https://ieeexplore.ieee.org/document/9237706 |
DOI | 10.1109/ICSESS49938.2020.9237706 |
Citation Key | zhou_two-stage_2020 |
- Payloads
- unsolicited e-mail
- two-stage P2P botnet detection method
- traffic statistical features
- telecommunication traffic
- statistical feature
- statistical analysis
- software engineering
- Resiliency
- resilience
- real-time systems
- pubcrawl
- Peer-to-peer computing
- benign P2P hosts
- p2p
- network security
- Monitoring
- Metrics
- machine learning
- invasive software
- feature extraction
- detection
- computer network security
- composability
- botnets
- botnet