International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 91 - Issue 5 |
Published: April 2014 |
Authors: Katha Chanda |
![]() |
Katha Chanda . Hybrid Botnet Detection Mechanism. International Journal of Computer Applications. 91, 5 (April 2014), 12-16. DOI=10.5120/15876-4823
@article{ 10.5120/15876-4823, author = { Katha Chanda }, title = { Hybrid Botnet Detection Mechanism }, journal = { International Journal of Computer Applications }, year = { 2014 }, volume = { 91 }, number = { 5 }, pages = { 12-16 }, doi = { 10.5120/15876-4823 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2014 %A Katha Chanda %T Hybrid Botnet Detection Mechanism%T %J International Journal of Computer Applications %V 91 %N 5 %P 12-16 %R 10.5120/15876-4823 %I Foundation of Computer Science (FCS), NY, USA
Botnets have emerged as one of the biggest threats to internet security in the recent years. They have confounded security researchers because of their mobile and secretive behavior. A Botnet is a network of zombie machines remotely controlled by a command server or a Botmaster. These compromised host machines may be used for sending spam, launching DOS attacks, spying or stealing information. As botnets have evolved, so has the detection techniques changed. A number of different techniques have been suggested yet no technique is completely foolproof. While some are based on detecting anomalies, others focus on DNS queries [Choi et al. , 2007] or DNSBL [Ramachandran et al. , 2006] queries etc. This paper analyzes layouts of different detection techniques. The paper tries to find features that, when combined together, complement each other's strengths and eliminate the weaknesses and suggests a framework consisting of a combination of those features which, theoretically, should overcome most of the common problems faced by detection techniques.