DocumentCode
3434840
Title
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
Author
Yen, Ting-Fang ; Reiter, Michael K.
Author_Institution
Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear
2010
fDate
21-25 June 2010
Firstpage
241
Lastpage
252
Abstract
Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-and-control. Despite the commonality of their substrates, we show that the different goals and circumstances of these applications give rise to behaviors that can be distinguished in network flow records. Using features related to traffic volume, “churn” among peers, and differences between human-driven and machine-driven traffic, we develop a technique for identifying P2P bots (the Plotters) and, in particular, separating them from file-sharing hosts (the Traders). Evaluations performed on traffic recorded at the edge of a university network show that we can achieve, e.g., 87.50% detection of Storm bots with a 0.47% false positive rate. We also demonstrate the significant extent to which Plotter behaviors would need to change to evade our technique.
Keywords
Communication channels; Distributed computing; Humans; Payloads; Peer to peer computing; Performance evaluation; Protocols; Storms; Telecommunication traffic; Testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on
Conference_Location
Genoa, Italy
ISSN
1063-6927
Print_ISBN
978-1-4244-7261-1
Type
conf
DOI
10.1109/ICDCS.2010.76
Filename
5541681
Link To Document