Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Threat Detection System for Mimicking Attacks in Cyberspace

S. RizwanaAzim, A. Seethalakshmi, K. ShamaRahuman, N. Subhashri, J. Dharani

Abstract


Botnet is one of the major reasons for malicious activities in cyberspace. It is a group of interconnected program that communicates with other programs in order to perform an illegal operation by botmaster through command and control mechanism, which leads to the possibility of stealing personal data such as mail accounts, bank accounts, credential details etc., Cyber behavior is the activities that human engage in interacting with internet. The attacker attacks the system as a genuine user by changing the proxy settings and performs their malicious activities. We proposed Mimicking Detection Algorithm which mainly focused on attacks such as Mimicking attack, flash crowd, DDOS and Information phishing attack from the client side by using statistical methodology for calculating the flow of page request. Fine correntropy is used for accurate detection and to measure the similarity between two random variables. Thus our approach is able to detect mimicking attacks from online cyber events.


Keywords


Botnet, Mimicking, Flash Crowd, DDoS.

Full Text:

PDF

References


A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst,“Characterizing the query behavior in peer-to-peer file sharing systems,” in Proc. 4th ACM SIGCOMM Conf. Internet Meas., 2004,pp. 55–67.

B. A. Huberman, P. L. T. Pirolli, J. E. Pitkow, and R. M. Lukose,“Strong regularities in world wide web surfing,” Science, vol. 280,no. 3, 1998.

B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski,R. Kemmerer, C. Kruegel, and G. Vigna, “Your botnet is my botnet:Analysis of a botnet takeover,” in Proc. ACM Conf. Comput. Commun.Security, 2009.

C. A. Shue, A. J. Kalafut, and M. Gupta, “Abnormally malicious autonomous systems and their internet connectivity,” IEEE/ACM Trans. Netw., vol. 20, no. 1, pp. 220–230, Feb. 2012

G. Oikonomou and J. Mirkovic, “Modeling human behavior for defense against flash-crowd attacks,” in Proc. IEEE Conf. Comput. Commun., 2009.

M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A survey of botnet technology and defenses,” in Proc. Cyber security Appl. Technol.Conf. Homeland Security, 2009.

S. Yu, S. Guo, and I. Stojmenovic, “Can we beat legitimate cyber behavior mimicking attacks from botnets,” in Proc. IEEE Conf.Comput. Commun. (INFOCOM), 2012, pp. 3133–3137.

T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of networkbased defense mechanisms countering the DOS and DDoS problems,”ACM Comput. Surv., vol. 39, no. 1, 2007.

Y. Xie and S.-Z. Yu, “A large-scale hidden semi-Markov model for Anomaly detection on user browsing behaviors,” IEEE/ACM Trans.Netw., vol. 17, no. 1, pp. 54–65, Feb. 2009.

Z. Li, A. Goyal, Y. Chen, and V. Paxson, “Towards situational awareness of large-scale botnet probing events,” IEEE Trans. Inf.Forensics Security, vol. 6, no. 1, pp. 175–188, Mar. 2011.


Refbacks

  • There are currently no refbacks.