Detecting Botnets Through Log Correlation

Computer Science – Artificial Intelligence

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

4 pages, 7 figures, Workshop on Monitoring, Attack Detection and Mitigation (MonAM2006)

Scientific paper

Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (SSoS) attacks, keylogging, and backdoors. In response to these threats, new effective techniques are needed to detect the presence of botnets. In this paper, we have used an interception technique to monitor Windows Application Programming Interface (API) functions calls made by communication applications and store these calls with their arguments in log files. Our algorithm detects botnets based on monitoring abnormal activity by correlating the changes in log file sizes from different hosts.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Detecting Botnets Through Log Correlation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Detecting Botnets Through Log Correlation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting Botnets Through Log Correlation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-357485

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.