Detecting P2P botnets through network behavior analysis and machine learning

@article{Saad2011DetectingPB,
  title={Detecting P2P botnets through network behavior analysis and machine learning},
  author={Sherif Saad and Issa Traor{\'e} and Ali A. Ghorbani and Bassam Sayed and David Zhao and Wei Lu and John Felix and Payman Hakimian},
  journal={2011 Ninth Annual International Conference on Privacy, Security and Trust},
  year={2011},
  pages={174-180}
}
Botnets have become one of the major threats on the Internet for serving as a vector for carrying attacks against organizations and committing cybercrimes. They are used to generate spam, carry out DDOS attacks and click-fraud, and steal sensitive information. In this paper, we propose a new approach for characterizing and detecting botnets using network traffic behaviors. Our approach focuses on detecting the bots before they launch their attack. We focus in this paper on detecting P2P bots… CONTINUE READING
Highly Influential
This paper has highly influenced 18 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 133 citations. REVIEW CITATIONS
86 Citations
16 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 86 extracted citations

133 Citations

0102030'13'15'17
Citations per Year
Semantic Scholar estimates that this publication has 133 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 16 references

Saeys, "Java-ML: A Machine Learning Library,

  • T. Abeel, Y. Van de Peer
  • Journal of Machine Learning Research,
  • 2009
1 Excerpt

Similar Papers

Loading similar papers…