Survey on Botnet and Its Detection Techniques

Authors

  • Shubham Gour  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Maharashtra India
  • Yogesh Bhosle  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Maharashtra India
  • Onkar Jagtap  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Maharashtra India
  • Pratik Nirmale  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Maharashtra India
  • Prof. Monika Dangore  Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegaon, Maharashtra India

Keywords:

Botnet, Botmaster,Intrusion Detection System(IDS), Neural Network, P2P, Network Traffic.

Abstract

Botnet term was coined when multiple networks of bots came into existence. It is a number of Internet-connected devices, which runs single or multiple bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, Ransomware, send spams, and allow attackers to gain unauthorised access on devices and its connections. Command and control(C&C) software are used by the Owner (BotMaster) to control the botnet. This paper explores the survey conducted on botnet and its detection techniques.

References

  1. Sudipta Chowdhury1*, Mojtaba Khanzadeh1, Ravi Akula1, Fangyan Zhang2, Song Zhang2, Hugh Medal1, Mohammad Marufuzzaman1, Linkan Bian1” Botnet detection using graph?based feature clustering”.
  2. Zhuang and J. M. Chang, “PeerHunter: Detecting peer-to-peer botnets through community behavior analysis,”.
  3. S. Lagraa, J. François, A. Lahmadi, M. Miner, C. Hammerschmidt and R. State, "BotGM: Unsupervised graph mining to detect botnets in traffic flows," 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, 2017, pp. 1-8, doi: 10.1109/CSNET.2017.8241990.
  4. Sara Khanchi, Ali Vahdat, Malcolm I. Heywood, A. Nur Zincir-Heywood,"On botnet detection with genetic programming under streaming data label budgets and class imbalance",Swarm and Evolutionary Computation,Volume 39,2018,,ISSN 2210-6502
  5. Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu,” Botnet Detection Using Recurrent Variational Autoencoder”.
  6. Hagan, M., Kang, B., McLaughlin, K., & Sezer, S, “Peer Based Tracking using Multi-Tuple Indexing for Network Traffic”.
  7. Raouf Boutaba 1, Mohammad A. Salahuddin 1, Noura Limam 1, Sara Ayoubi 1, Nashid Shahriar 1, Felipe Estrada-Solano1,2 and Oscar M. Caicedo 2 “Survey on machine learning for networking: evolution, applications and research opportunities”.
  8. E. M. Hutchins, M. J. Cloppert, and R. M. Amin, “Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains,” Inf. Warfare Security Res., vol. 1, no. 1, p. 80,2011.
  9. S. Chen, Y. Chen and W. Tzeng, "Effective Botnet Detection Through Neural Networks on Convolutional Features," 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, 2018, pp. 372-378, doi: 10.1109/TrustCom/BigDataSE.2018.00062.
  10. B. Alothman and P. Rattadilok, "Towards using transfer learning for Botnet Detection," 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), Cambridge, 2017, pp. 281-282, doi: 10.23919/ICITST.2017.8356400.
  11. G. Vormayr, T. Zseby and J. Fabini, "Botnet Communication Patterns," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2768-2796, Fourthquarter 2017, doi: 10.1109/COMST.2017.2749442.
  12. H. Dhayal and J. Kumar, "Botnet and P2P Botnet Detection Strategies: A Review," 2018 International Conference on Communication and Signal Processing (ICCSP), Chennai, 2018, pp. 1077-1082, doi: 10.1109/ICCSP.2018.8524529.
  13. C. Czosseck, G. Klein and F. Leder, "On the arms race around botnets - Setting up and taking down botnets," 2011 3rd International Conference on Cyber Conflict, Tallinn, 2011, pp. 1-14.
  14. K. Alieyan, M. Anbar, A. Almomani, R. Abdullah and M. Alauthman, "Botnets Detecting Attack Based on DNS Features," 2018 International Arab Conference on Information Technology (ACIT), Werdanye, Lebanon, 2018, pp. 1-4, doi: 10.1109/ACIT.2018.8672582.
  15. W. Zhang, Y. -J. Wang and X. -L. Wang, "A Survey of Defense against P2P Botnets," 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, Dalian, 2014, pp. 97-102, doi: 10.1109/DASC.2014.26.
  16. W. Sun and H. Gou, "The Botnet Defense and Control," 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, Nanjing, Jiangsu, 2011, pp. 339-342, doi: 10.1109/ICM.2011.218.
  17. M. Khosroshahy, M. K. Mehmet Ali and D. Qiu, "Scomf and SComI botnet models: The cases of initial unhindered botnet expansion," 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Montreal, QC, 2012, pp. 1-5, doi: 10.1109/CCECE.2012.6334871.

Downloads

Published

2020-12-18

Issue

Section

Research Articles

How to Cite

[1]
Shubham Gour, Yogesh Bhosle, Onkar Jagtap, Pratik Nirmale, Prof. Monika Dangore "Survey on Botnet and Its Detection Techniques" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 5, Issue 8, pp.126-132, November-December-2020.