DocumentCode :
3705313
Title :
Hide and seek: Detecting sensors in P2P botnets
Author :
Leon B?ck;Shankar Karuppayah;Tim Grube;Max M?hlh?user;Mathias Fischer
Author_Institution :
Telecooperation Group, TU Darmstadt / CASED, Germany
fYear :
2015
Firstpage :
731
Lastpage :
732
Abstract :
Many cyber-crimes, such as Denial of Service (DoS) attacks and banking frauds, originate from botnets. To prevent botnets from being taken down easily, botmasters have adopted peer-to-peer (P2P) mechanisms to prevent any single point of failure. However, sensor nodes that are often used for both, monitoring and executing sinkholing attacks, are threatening such botnets. In this paper, we introduce a novel mechanism to detect sensor nodes in P2P botnets using the clustering coefficient as a metric. We evaluated our mechanism on the real-world botnet Sality over the course of a week and were able to detect an average of 25 sensors per day with a false positive rate of 20%.
Keywords :
"Monitoring","Peer-to-peer computing"
Publisher :
ieee
Conference_Titel :
Communications and Network Security (CNS), 2015 IEEE Conference on
Type :
conf
DOI :
10.1109/CNS.2015.7346908
Filename :
7346908
Link To Document :
بازگشت