Abstract
Fast development of computer and especially Internet caused many issues for its users as well as its benefits. Nowadays, cyber criminals are utilizing Botnets to reach their goals. They have noticed that centralized structure is detected quickly. Hence the Peer to Peer Botnets are the most recent kind of Botnets that, they are applying encryption as well as rootkit capabilities to not being detected. In addition they mimic the performance of P2P software such as BitTorrent to make hard distinguishing the healthy packet from malicious packet in a large dataset. The proposed method is based on the correlation of Process Name besides the Ports as well as the Network Traffic. In the existing Operating Systems, every process is assigned a number that is called Port. By using this unique port and the process name, our experimental results show an acceptable rate of detection.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011 |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 928-933 |
Number of pages | 6 |
ISBN (Print) | 978-146730125-1 |
DOIs | |
Publication status | Published - 2011 |
Externally published | Yes |
Event | 2011 World Congress on Information and Communication Technologies - Mumbai; India Duration: 11 Dec 2011 → 14 Dec 2011 |
Conference
Conference | 2011 World Congress on Information and Communication Technologies |
---|---|
Abbreviated title | WICT 2011 |
Period | 11/12/11 → 14/12/11 |