Detecting Botnets Through Log Correlation

01/15/2010
by   Yousof Al-Hammadi, et al.
0

Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (SSoS) attacks, keylogging, and backdoors. In response to these threats, new effective techniques are needed to detect the presence of botnets. In this paper, we have used an interception technique to monitor Windows Application Programming Interface (API) functions calls made by communication applications and store these calls with their arguments in log files. Our algorithm detects botnets based on monitoring abnormal activity by correlating the changes in log file sizes from different hosts.

READ FULL TEXT
research
02/05/2010

Detecting Bots Based on Keylogging Activities

A bot is a piece of software that is usually installed on an infected ma...
research
02/13/2018

Towards Generic Deobfuscation of Windows API Calls

A common way to get insight into a malicious program's functionality is ...
research
10/16/2022

Interpretable Machine Learning for Detection and Classification of Ransomware Families Based on API Calls

Ransomware has appeared as one of the major global threats in recent day...
research
08/28/2019

Immutable Log Storage as a Service

Logs contain critical information about the quality of the rendered serv...
research
07/30/2019

Observability and Chaos Engineering on System Calls for Containerized Applications in Docker

In this paper, we present a novel fault injection system called ChaosOrc...
research
07/24/2020

Detecting malicious PDF using CNN

Malicious PDF files represent one of the biggest threats to computer sec...
research
06/06/2021

Towards Logging Noisiness Theory: quality aspects to characterize unwanted log entries

Context: Logging tasks track the system's functioning by keeping records...

Please sign up or login with your details

Forgot password? Click here to reset