Peer to peer botnet detection based on flow intervals and fast flux network capture

dc.contributor.authorZhao, David
dc.contributor.supervisorTraore, Issa
dc.date.accessioned2012-10-16T21:34:11Z
dc.date.available2012-10-16T21:34:11Z
dc.date.copyright2012en_US
dc.date.issued2012-10-16
dc.degree.departmentDepartment of Electrical and Computer Engineering
dc.degree.levelMaster of Applied Science M.A.Sc.en_US
dc.description.abstractBotnets are becoming the predominant threat on the Internet today and is the primary vector for carrying out attacks against organizations and individuals. Botnets have been used in a variety of cybercrime, from click-fraud to DDOS attacks to the generation of spam. In this thesis we propose an approach to detect botnet activity using two different strategies both based on machine learning techniques. In one, we examine the network flow based metrics of potential botnet traffic and show that we are able to detect botnets with only data from a small time interval of operation. For our second technique, we use a similar strategy to identify botnets based on their potential fast flux behavior. For both techniques, we show experimentally that the presence of botnets may be detected with a high accuracy and identify their potential limitations.en_US
dc.description.scholarlevelGraduateen_US
dc.identifier.urihttp://hdl.handle.net/1828/4301
dc.languageEnglisheng
dc.language.isoenen_US
dc.rights.tempAvailable to the World Wide Weben_US
dc.subjectBotneten_US
dc.subjectNetwork Intrusion Detectionen_US
dc.subjectTraffic Behavior Analysisen_US
dc.subjectNetwork Flowsen_US
dc.titlePeer to peer botnet detection based on flow intervals and fast flux network captureen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
zhao_david_masc_2012.pdf
Size:
2.06 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.74 KB
Format:
Item-specific license agreed upon to submission
Description: