An analysis of network traffic characteristics for Botnet detection
- Autores
- Erquiaga, María José; Catania, Carlos; García Garino, Carlos
- Año de publicación
- 2012
- Idioma
- inglés
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- The fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for di erent kind of attacks, such as SPAM, Denegation of Service, key logging and tra c sni ng, among others. In this paper we analyze some of the most relevant network tra c characteristics used for Botnet recognition. We have reviewed the most important works in the eld of Botnet detection and have carried out an analysis in order to establish which are more appropriate to describe the Botnet behavior. Our final goal is to provide to network administrators the bases for building tools that can help them in their daily ght against this security threat.
Eje: Workshop de seguridad informática (WSI)
Red de Universidades con Carreras en Informática (RedUNCI) - Materia
-
Ciencias Informáticas
network traffic
informática
Botnet detection - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/23846
Ver los metadatos del registro completo
id |
SEDICI_3489001adf362db80c6736b1d8ab8b2c |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/23846 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
An analysis of network traffic characteristics for Botnet detectionErquiaga, María JoséCatania, CarlosGarcía Garino, CarlosCiencias Informáticasnetwork trafficinformáticaBotnet detectionThe fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for di erent kind of attacks, such as SPAM, Denegation of Service, key logging and tra c sni ng, among others. In this paper we analyze some of the most relevant network tra c characteristics used for Botnet recognition. We have reviewed the most important works in the eld of Botnet detection and have carried out an analysis in order to establish which are more appropriate to describe the Botnet behavior. Our final goal is to provide to network administrators the bases for building tools that can help them in their daily ght against this security threat.Eje: Workshop de seguridad informática (WSI)Red de Universidades con Carreras en Informática (RedUNCI)2012-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdfhttp://sedici.unlp.edu.ar/handle/10915/23846enginfo:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/2.5/ar/Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T10:55:36Zoai:sedici.unlp.edu.ar:10915/23846Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 10:55:36.65SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
An analysis of network traffic characteristics for Botnet detection |
title |
An analysis of network traffic characteristics for Botnet detection |
spellingShingle |
An analysis of network traffic characteristics for Botnet detection Erquiaga, María José Ciencias Informáticas network traffic informática Botnet detection |
title_short |
An analysis of network traffic characteristics for Botnet detection |
title_full |
An analysis of network traffic characteristics for Botnet detection |
title_fullStr |
An analysis of network traffic characteristics for Botnet detection |
title_full_unstemmed |
An analysis of network traffic characteristics for Botnet detection |
title_sort |
An analysis of network traffic characteristics for Botnet detection |
dc.creator.none.fl_str_mv |
Erquiaga, María José Catania, Carlos García Garino, Carlos |
author |
Erquiaga, María José |
author_facet |
Erquiaga, María José Catania, Carlos García Garino, Carlos |
author_role |
author |
author2 |
Catania, Carlos García Garino, Carlos |
author2_role |
author author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas network traffic informática Botnet detection |
topic |
Ciencias Informáticas network traffic informática Botnet detection |
dc.description.none.fl_txt_mv |
The fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for di erent kind of attacks, such as SPAM, Denegation of Service, key logging and tra c sni ng, among others. In this paper we analyze some of the most relevant network tra c characteristics used for Botnet recognition. We have reviewed the most important works in the eld of Botnet detection and have carried out an analysis in order to establish which are more appropriate to describe the Botnet behavior. Our final goal is to provide to network administrators the bases for building tools that can help them in their daily ght against this security threat. Eje: Workshop de seguridad informática (WSI) Red de Universidades con Carreras en Informática (RedUNCI) |
description |
The fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for di erent kind of attacks, such as SPAM, Denegation of Service, key logging and tra c sni ng, among others. In this paper we analyze some of the most relevant network tra c characteristics used for Botnet recognition. We have reviewed the most important works in the eld of Botnet detection and have carried out an analysis in order to establish which are more appropriate to describe the Botnet behavior. Our final goal is to provide to network administrators the bases for building tools that can help them in their daily ght against this security threat. |
publishDate |
2012 |
dc.date.none.fl_str_mv |
2012-10 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/23846 |
url |
http://sedici.unlp.edu.ar/handle/10915/23846 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc-sa/2.5/ar/ Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/ Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1844615815719026688 |
score |
13.070432 |