Computer Science – Artificial Intelligence
Scientific paper
2010-01-15
Proceedings of the Workshop on Monitoring, Attack Detection and Mitigation (MonAM2006)
Computer Science
Artificial Intelligence
4 pages, 7 figures, Workshop on Monitoring, Attack Detection and Mitigation (MonAM2006)
Scientific paper
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (SSoS) attacks, keylogging, and backdoors. In response to these threats, new effective techniques are needed to detect the presence of botnets. In this paper, we have used an interception technique to monitor Windows Application Programming Interface (API) functions calls made by communication applications and store these calls with their arguments in log files. Our algorithm detects botnets based on monitoring abnormal activity by correlating the changes in log file sizes from different hosts.
Aickelin Uwe
Al-Hammadi Yousof
No associations
LandOfFree
Detecting Botnets Through Log Correlation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Detecting Botnets Through Log Correlation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting Botnets Through Log Correlation will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-357485