Botnet detection within cloud service provider networks using flow protocols

作者: Mark Graham , Adrian Winckles , Erika Sanchez-Velazquez

DOI: 10.1109/INDIN.2015.7281975

关键词:

摘要: … This work aims to detect botnet traffic within an abstracted virtualised … flow export can capture network traffic parameters for identifying the presence of a command and control botnet …

参考文章(22)
Yu-Lun Huang, Borting Chen, Ming-Wei Shih, Chien-Yu Lai, Security Impacts of Virtualization on a Network Testbed 2012 IEEE Sixth International Conference on Software Security and Reliability. pp. 71- 77 ,(2012) , 10.1109/SERE.2012.17
Amarnath Jasti, Payal Shah, Rajeev Nagaraj, Ravi Pendse, Security in multi-tenancy cloud 44th Annual 2010 IEEE International Carnahan Conference on Security Technology. pp. 35- 41 ,(2010) , 10.1109/CCST.2010.5678682
Sakir Sezer, Sandra Scott-Hayward, Pushpinder Chouhan, Barbara Fraser, David Lake, Jim Finnegan, Niel Viljoen, Marc Miller, Navneet Rao, Are we ready for SDN? Implementation challenges for software-defined networks IEEE Communications Magazine. ,vol. 51, pp. 36- 43 ,(2013) , 10.1109/MCOM.2013.6553676
Lei Zhang, Shui Yu, Di Wu, Paul Watters, A Survey on Latest Botnet Attack and Defense trust security and privacy in computing and communications. pp. 53- 60 ,(2011) , 10.1109/TRUSTCOM.2011.11
Li Da Xu, Wu He, Shancang Li, Internet of Things in Industries: A Survey IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 2233- 2243 ,(2014) , 10.1109/TII.2014.2300753
Stamatis Karnouskos, Stuxnet worm impact on industrial cyber-physical system security conference of the industrial electronics society. pp. 4490- 4494 ,(2011) , 10.1109/IECON.2011.6120048
Fariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, A. Nur Zincir-Heywood, Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers advanced information networking and applications. pp. 7- 12 ,(2014) , 10.1109/WAINA.2014.19
Rick Hofstede, Pavel Celeda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, Aiko Pras, Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 2037- 2064 ,(2014) , 10.1109/COMST.2014.2321898
Sheharbano Khattak, Naurin Rasheed Ramay, Kamran Riaz Khan, Affan A. Syed, Syed Ali Khayam, A Taxonomy of Botnet Behavior, Detection, and Defense IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 898- 924 ,(2014) , 10.1109/SURV.2013.091213.00134
Tiago Fioreze, Lisandro Zambenedetti Granville, Aiko Pras, Anna Sperotto, Ramin Sadre, Self-management of hybrid networks: Can we trust netflow data? integrated network management. pp. 577- 584 ,(2009) , 10.1109/INM.2009.5188864