-In this upcoming highly engaged traffic calls in the Peer to Peer (P2P) botnets the high scalability of detection systems is going down. Where the botmasters adopt modern system to detect traffic which ends in the malicious activities and poor scalability. So in this paper, we proposed a highly scalable botnet detection system for a stealthy peer to peer botnets. In this p2p detection it will identify the hosts which are liked to engage in the peer to peer communications and will generate the finger prints of the p2p traffic. Once the p2p fingerprints reaches p2p profile it then distinguishes between each p2p botnet traffic and finds which is correctly established p2p traffic is. And the main feature is the built in parallelized computation which leads to demonstrate high accurate detection and great scalability.
[1]
Phillip A. Porras,et al.
A Multi-perspective Analysis of the Storm ( Peacomm ) Worm
,
2007
.
[2]
Michael K. Reiter,et al.
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
,
2010,
2010 IEEE 30th International Conference on Distributed Computing Systems.
[3]
Brent Byunghoon Kang,et al.
The waledac protocol: The how and why
,
2009,
2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[4]
Sven Dietrich,et al.
Analysis of the Storm and Nugache Trojans: P2P Is Here
,
2007,
login Usenix Mag..
[5]
Guofei Gu,et al.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
,
2008,
USENIX Security Symposium.