DocumentCode :
120356
Title :
Design, deployment and use of HTTP-based botnet (HBB) testbed
Author :
Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B.B. ; Singh, Prashant ; Anbar, Mohammed
Author_Institution :
Univ. of Wasit, Wasit, Iraq
fYear :
2014
fDate :
16-19 Feb. 2014
Firstpage :
1265
Lastpage :
1269
Abstract :
Botnet is one of the most widespread and serious malware which occur frequently in today´s cyber attacks. A botnet is a group of Internet-connected computer programs communicating with other similar programs in order to perform various attacks. HTTP-based botnet is most dangerous botnet among all the different botnets available today. In botnets detection, in particularly, behavioural-based approaches suffer from the unavailability of the benchmark datasets and this lead to lack of precise results evaluation of botnet detection systems, comparison, and deployment which originates from the deficiency of adequate datasets. Most of the datasets in the botnet field are from local environment and cannot be used in the large scale due to privacy problems and do not reflect common trends, and also lack some statistical features. To the best of our knowledge, there is not any benchmark dataset available which is infected by HTTP-based botnet (HBB) for performing Distributed Denial of Service (DDoS) attacks against Web servers by using HTTP-GET flooding method. In addition, there is no Web access log infected by botnet is available for researchers. Therefore, in this paper, a complete test-bed will be illustrated in order to implement a real time HTTP-based botnet for performing variety of DDoS attacks against Web servers by using HTTP-GET flooding method. In addition to this, Web access log with http bot traces are also generated. These real time datasets and Web access logs can be useful to study the behaviour of HTTP-based botnet as well as to evaluate different solutions proposed to detect HTTP-based botnet by various researchers.
Keywords :
invasive software; DDoS attacks; HBB testbed; HTTP-GET flooding method; Internet-connected computer programs; Web access log; Web servers; behavioural-based approaches; botnet detection systems; cyber attacks; distributed denial of service attacks; http bot traces; malware; real time HTTP-based botnet; Computer crime; Floods; Intrusion detection; Web servers; Botnet; Cyber attacks; DDoS attacks; HTTP flooding; HTTP-based botnet;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology (ICACT), 2014 16th International Conference on
Conference_Location :
Pyeongchang
Print_ISBN :
978-89-968650-2-5
Type :
conf
DOI :
10.1109/ICACT.2014.6779162
Filename :
6779162
Link To Document :
بازگشت