A new scalable botnet detection method in the frequency domain

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Botnets have become one of the most significant cyber threat over the last decade. The diffusion of the “Internet of Things” and its for-profit exploitation, contributed to botnets spread and sophistication, thus providing real, efficient and profitable criminal cyber-services. Recent research on botnet detection focuses on traffic pattern-based detection, analyzing the network traffic generated by the infected hosts, in order to find malicious behaviors regardless of the specific payload, architecture and protocol. In this chapter, we address the periodic behavior of infected hosts communicating with their Command-and-Control (C2) servers. We introduce an effective, fast and scalable approach based on the layer-5 traffic analysis in the frequency domain, without using the well-known Fast Fourier Transform. The mentioned analysis has been performed exploiting the logs of a wide corporate network and tested on real malware samples, in order to demonstrate its applicability almost in every practical scenario.

Cite

CITATION STYLE

APA

Bottazzi, G., Italiano, G. F., & Rutigliano, G. G. (2018). A new scalable botnet detection method in the frequency domain. In Advanced Sciences and Technologies for Security Applications (pp. 141–166). Springer. https://doi.org/10.1007/978-3-319-97181-0_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free