A novel approach of botnet feature analysis

S. L. Chen, Y. Y. Chen, Y. T. Cheng, S. H. Kuo, H. P. Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Computers infected by botnets can be remotely controlled by attackers on the cloud, which is one of the most common attack platforms on software systems and has become an important issue in the information security domain. In this paper, we collect and analyze the suspicious cloud network flow information by setting up experiment environments for observing different infected machines for extracting features of real-world botnets and monitoring the machines connected to botnet black lists in the network of National Cheng Kung University.

Original languageEnglish
Title of host publicationApplied System Innovation - Proceedings of the International Conference on Applied System Innovation, ICASI 2015
EditorsTeen-Hang Meen, Stephen D. Prior, Artde Donald Kin-Tak Lam
PublisherCRC Press/Balkema
Pages1027-1030
Number of pages4
ISBN (Print)9781138028937
DOIs
Publication statusPublished - 2016
EventInternational Conference on Applied System Innovation, ICASI 2015 - Osaka, Japan
Duration: 2015 May 222015 May 27

Publication series

NameApplied System Innovation - Proceedings of the International Conference on Applied System Innovation, ICASI 2015

Other

OtherInternational Conference on Applied System Innovation, ICASI 2015
CountryJapan
CityOsaka
Period15-05-2215-05-27

All Science Journal Classification (ASJC) codes

  • Business, Management and Accounting (miscellaneous)
  • Computer Networks and Communications
  • Computer Science Applications
  • Control and Optimization
  • Control and Systems Engineering
  • Social Sciences (miscellaneous)
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'A novel approach of botnet feature analysis'. Together they form a unique fingerprint.

Cite this