Clustering Botnet Communication Traffic Based on N-Gram Feature Selection

Download Now Free registration required

Executive Summary

Recognized as one the most serious security threats on current Internet infrastructure, botnets cannot only be implemented by existing well known applications, e.g. IRC, HTTP, or Peer-to-Peer, but also can be constructed by unknown or creative applications, which makes the botnet detection a challenging problem. Previous attempts for detecting botnets are mostly to examine traffic content for bot command on selected network links or by setting up honeypots. Traffic content, however, can be encrypted with the evolution of botnet, and as a result leading to a fail of content based detection approaches.

  • Format: PDF
  • Size: 791.9 KB