Title
Hide and seek: Detecting sensors in P2P botnets
Abstract
Many cyber-crimes, such as Denial of Service (DoS) attacks and banking frauds, originate from botnets. To prevent botnets from being taken down easily, botmasters have adopted peer-to-peer (P2P) mechanisms to prevent any single point of failure. However, sensor nodes that are often used for both, monitoring and executing sinkholing attacks, are threatening such botnets. In this paper, we introduce a novel mechanism to detect sensor nodes in P2P botnets using the clustering coefficient as a metric. We evaluated our mechanism on the real-world botnet Sality over the course of a week and were able to detect an average of 25 sensors per day with a false positive rate of 20%.
Year
Venue
Field
2015
IEEE Conference on Communications and Network Security
False positive rate,Sality,Single point of failure,Denial-of-service attack,Computer science,Computer security,Botnet,Computer network,Dead Peer Detection,Peer to peer computing,Clustering coefficient
DocType
ISSN
Citations 
Conference
2474-025X
2
PageRank 
References 
Authors
0.40
6
5
Name
Order
Citations
PageRank
Leon Bock162.86
Shankar Karuppayah21249.82
Tim Grube3197.54
Max Mühlhäuser41652252.87
Mathias Fischer515621.11