An analysis of network traffic characteristics for Botnet detection

Autores
Erquiaga, María José; Catania, Carlos; García Garino, Carlos
Año de publicación
2012
Idioma
inglés
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
The fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for di erent kind of attacks, such as SPAM, Denegation of Service, key logging and tra c sni ng, among others. In this paper we analyze some of the most relevant network tra c characteristics used for Botnet recognition. We have reviewed the most important works in the eld of Botnet detection and have carried out an analysis in order to establish which are more appropriate to describe the Botnet behavior. Our final goal is to provide to network administrators the bases for building tools that can help them in their daily ght against this security threat.
Eje: Workshop de seguridad informática (WSI)
Red de Universidades con Carreras en Informática (RedUNCI)
Materia
Ciencias Informáticas
network traffic
informática
Botnet detection
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/23846

id SEDICI_3489001adf362db80c6736b1d8ab8b2c
oai_identifier_str oai:sedici.unlp.edu.ar:10915/23846
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling An analysis of network traffic characteristics for Botnet detectionErquiaga, María JoséCatania, CarlosGarcía Garino, CarlosCiencias Informáticasnetwork trafficinformáticaBotnet detectionThe fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for di erent kind of attacks, such as SPAM, Denegation of Service, key logging and tra c sni ng, among others. In this paper we analyze some of the most relevant network tra c characteristics used for Botnet recognition. We have reviewed the most important works in the eld of Botnet detection and have carried out an analysis in order to establish which are more appropriate to describe the Botnet behavior. Our final goal is to provide to network administrators the bases for building tools that can help them in their daily ght against this security threat.Eje: Workshop de seguridad informática (WSI)Red de Universidades con Carreras en Informática (RedUNCI)2012-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdfhttp://sedici.unlp.edu.ar/handle/10915/23846enginfo:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/2.5/ar/Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T10:55:36Zoai:sedici.unlp.edu.ar:10915/23846Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 10:55:36.65SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv An analysis of network traffic characteristics for Botnet detection
title An analysis of network traffic characteristics for Botnet detection
spellingShingle An analysis of network traffic characteristics for Botnet detection
Erquiaga, María José
Ciencias Informáticas
network traffic
informática
Botnet detection
title_short An analysis of network traffic characteristics for Botnet detection
title_full An analysis of network traffic characteristics for Botnet detection
title_fullStr An analysis of network traffic characteristics for Botnet detection
title_full_unstemmed An analysis of network traffic characteristics for Botnet detection
title_sort An analysis of network traffic characteristics for Botnet detection
dc.creator.none.fl_str_mv Erquiaga, María José
Catania, Carlos
García Garino, Carlos
author Erquiaga, María José
author_facet Erquiaga, María José
Catania, Carlos
García Garino, Carlos
author_role author
author2 Catania, Carlos
García Garino, Carlos
author2_role author
author
dc.subject.none.fl_str_mv Ciencias Informáticas
network traffic
informática
Botnet detection
topic Ciencias Informáticas
network traffic
informática
Botnet detection
dc.description.none.fl_txt_mv The fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for di erent kind of attacks, such as SPAM, Denegation of Service, key logging and tra c sni ng, among others. In this paper we analyze some of the most relevant network tra c characteristics used for Botnet recognition. We have reviewed the most important works in the eld of Botnet detection and have carried out an analysis in order to establish which are more appropriate to describe the Botnet behavior. Our final goal is to provide to network administrators the bases for building tools that can help them in their daily ght against this security threat.
Eje: Workshop de seguridad informática (WSI)
Red de Universidades con Carreras en Informática (RedUNCI)
description The fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for di erent kind of attacks, such as SPAM, Denegation of Service, key logging and tra c sni ng, among others. In this paper we analyze some of the most relevant network tra c characteristics used for Botnet recognition. We have reviewed the most important works in the eld of Botnet detection and have carried out an analysis in order to establish which are more appropriate to describe the Botnet behavior. Our final goal is to provide to network administrators the bases for building tools that can help them in their daily ght against this security threat.
publishDate 2012
dc.date.none.fl_str_mv 2012-10
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/23846
url http://sedici.unlp.edu.ar/handle/10915/23846
dc.language.none.fl_str_mv eng
language eng
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1844615815719026688
score 13.070432