Abstract—The decentralized nature of Peer-to-Peer (P2P) bot-nets makes them difficult to detect. Their distributed nature also exhibits resilience against take-down attempts. Moreover, smarter bots are stealthy in their communication patterns, and elude the standard discovery techniques which look for anomalous network or communication behavior. In this paper, we propose PeerShark, a novel methodology to detect P2P botnet traffic and differentiate it from benign P2P traffic in a network. Instead of the traditional 5-tuple ‘flow-based ’ detection approach, we use a 2-tuple ‘conversation-based ’ approach which is port-oblivious, protocol-oblivious and does not require Deep Packet Inspection. PeerShark could also classify different P2P applica...
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious ...
Botnets, which are networks of compromised machines that are controlled by one or a group of attacke...
currently lack effective means for discovering and tracking peer-to-peer (P2P) applications on their...
Abstract—The decentralized nature of Peer-to-Peer (P2P) bot-nets makes them difficult to detect. The...
conversation-generation for malicious peer-to-peer traffic identification Pratik Narang1*, Chittaran...
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency to take-dow...
Abstract-Peer-to-peer (P2P) botnets are the modern and most resilient bot structure which might be m...
Abstract—Advanced botnets adopt a peer-to-peer (P2P) infras-tructure for more resilient command and ...
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against tak...
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against tak...
One of the most serious threats against the Internet is attacks from botnets. The botnet amplifies t...
The problem of detection of malicious network traffic is adversarial in nature. Accurate detection o...
Botnet has been identified as one of the most emerging threats to the Internet users.It has been att...
Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as t...
Abstract — A botnet is a network of compromised computers that are infected with code that allows an...
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious ...
Botnets, which are networks of compromised machines that are controlled by one or a group of attacke...
currently lack effective means for discovering and tracking peer-to-peer (P2P) applications on their...
Abstract—The decentralized nature of Peer-to-Peer (P2P) bot-nets makes them difficult to detect. The...
conversation-generation for malicious peer-to-peer traffic identification Pratik Narang1*, Chittaran...
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency to take-dow...
Abstract-Peer-to-peer (P2P) botnets are the modern and most resilient bot structure which might be m...
Abstract—Advanced botnets adopt a peer-to-peer (P2P) infras-tructure for more resilient command and ...
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against tak...
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against tak...
One of the most serious threats against the Internet is attacks from botnets. The botnet amplifies t...
The problem of detection of malicious network traffic is adversarial in nature. Accurate detection o...
Botnet has been identified as one of the most emerging threats to the Internet users.It has been att...
Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as t...
Abstract — A botnet is a network of compromised computers that are infected with code that allows an...
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious ...
Botnets, which are networks of compromised machines that are controlled by one or a group of attacke...
currently lack effective means for discovering and tracking peer-to-peer (P2P) applications on their...