P2P Botnet Traffic Analysis and Identification

碩士 === 國立新竹教育大學 === 資訊科學研究所 === 99 === The Internet has become an indispensable part of the human life and it provides us with convenient services, for example, searching for information, using auction website, playing online game, and so on. Due to its convenience, hackers are trying to commit...

Full description

Bibliographic Details
Main Authors: LiZhong Deng, 鄧立忠
Other Authors: Wernhuar Tarng
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/12410425287795271638
id ndltd-TW-099NHCT5394002
record_format oai_dc
spelling ndltd-TW-099NHCT53940022016-04-11T04:22:39Z http://ndltd.ncl.edu.tw/handle/12410425287795271638 P2P Botnet Traffic Analysis and Identification P2P殭屍網路的流量分析與辨識 LiZhong Deng 鄧立忠 碩士 國立新竹教育大學 資訊科學研究所 99 The Internet has become an indispensable part of the human life and it provides us with convenient services, for example, searching for information, using auction website, playing online game, and so on. Due to its convenience, hackers are trying to commit crimes to obtain some benefits. Therefore, network security has become a important issue of research area today. Usually, crackers use a variety of methods to achieve the purpose of attacks, for example, Distributed Denial of Service (DDOS) and spam mail. These methods require a large number of computers to achieve the goal; hence crackers must spread malicious software to infect the computers with lower defending mechanisms. The infected computers will become the zombies in the botnets controlled by the crackers.Thus, it is an important subject in network security to detect and defend the botnets.Among them, the Peer-to-Peer (P2P) botnet is a new type of botnets with every zombie as a peer controlled cracker and thus the defending is more difficult. The object of this research is to find out the traffic flows produced by known or unknown malicious software for defending the P2P botnet. Base on the analysis of P2P network’s connection flows and their package patterns, a mechanism containing six stages is proposed to identify P2P botnet traffics and locate the zombies, and the objective is to restrain these computers from further infection. Wernhuar Tarng 唐文華 2011 學位論文 ; thesis 59 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立新竹教育大學 === 資訊科學研究所 === 99 === The Internet has become an indispensable part of the human life and it provides us with convenient services, for example, searching for information, using auction website, playing online game, and so on. Due to its convenience, hackers are trying to commit crimes to obtain some benefits. Therefore, network security has become a important issue of research area today. Usually, crackers use a variety of methods to achieve the purpose of attacks, for example, Distributed Denial of Service (DDOS) and spam mail. These methods require a large number of computers to achieve the goal; hence crackers must spread malicious software to infect the computers with lower defending mechanisms. The infected computers will become the zombies in the botnets controlled by the crackers.Thus, it is an important subject in network security to detect and defend the botnets.Among them, the Peer-to-Peer (P2P) botnet is a new type of botnets with every zombie as a peer controlled cracker and thus the defending is more difficult. The object of this research is to find out the traffic flows produced by known or unknown malicious software for defending the P2P botnet. Base on the analysis of P2P network’s connection flows and their package patterns, a mechanism containing six stages is proposed to identify P2P botnet traffics and locate the zombies, and the objective is to restrain these computers from further infection.
author2 Wernhuar Tarng
author_facet Wernhuar Tarng
LiZhong Deng
鄧立忠
author LiZhong Deng
鄧立忠
spellingShingle LiZhong Deng
鄧立忠
P2P Botnet Traffic Analysis and Identification
author_sort LiZhong Deng
title P2P Botnet Traffic Analysis and Identification
title_short P2P Botnet Traffic Analysis and Identification
title_full P2P Botnet Traffic Analysis and Identification
title_fullStr P2P Botnet Traffic Analysis and Identification
title_full_unstemmed P2P Botnet Traffic Analysis and Identification
title_sort p2p botnet traffic analysis and identification
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/12410425287795271638
work_keys_str_mv AT lizhongdeng p2pbotnettrafficanalysisandidentification
AT dènglìzhōng p2pbotnettrafficanalysisandidentification
AT lizhongdeng p2pjiāngshīwǎnglùdeliúliàngfēnxīyǔbiànshí
AT dènglìzhōng p2pjiāngshīwǎnglùdeliúliàngfēnxīyǔbiànshí
_version_ 1718220849405755392