Skip to main content

P2P Bot Detection Based on Host Behavior and Big Data Technology

  • Conference paper
  • First Online:
Applied Soft Computing and Communication Networks

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 187))

Abstract

A botnet is a herd of malware compromised devices, known as bots, connected through the Internet to perform malicious activities. The botnet can be of two types based on the architecture, namely client–server architecture (centralized botnet) and peer-to-peer architecture (P2P botnet). In the last few years, P2P botnets have been emerging as the biggest threat to networks. With the evolution of P2P botnets, detection has become a more challenging task since it can easily blend with benign network traffic and makes it hard to detect P2P bots in the presence of benign P2P. Modern P2P botnet detection system needs to process huge packet capture (PCAP) files as the amount of traffic data generated in the network is enormous. This paper proposes a Hadoop-based P2P botnet detection system that detects P2P bots in the local area network (LAN) which consists of both P2P bot and benign P2P traffic and reads PCAP files directly from Hadoop distributed file system (HDFS) and avoids conversion of PCAP files to text. The detection is based on the various characteristics of P2P bots such as count of unique destination hosts connected, total amount of data transferred from the source host, average of the TTL value of the packets transferred from the source host and count of unique destination ports connected. Experiments and evaluations are done on the publicly available real network dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Botnet, https://en.wikipedia.org/wiki/Botnet

  2. Vinayakumar R, Soman K, Poornachandran P, Alazab M, Jolfaei A (2019) DBD: deep learning dga-based botnet detection. In: Deep learning applications for cyber security. Springer, Cham, Switzerland, pp 127–149

    Google Scholar 

  3. Thejiya V, Radhika N, Thanudhas B (2016) J-Botnet detector: a java based tool for HTTP botnet detection. Int J Sci Res (IJSR) 5(7):282–290

    Google Scholar 

  4. Gopalakrishnan P, Keerthi Madhuvani PS, Maneesh Kumar Reddy P (2020) Bot detection in cloud storage systems–a preparatory effort. J Crit Rev 7(6):842–848.

    Google Scholar 

  5. P2P botnet, https://cs.ucf.edu/~czou/research/P2PBotnets-bookChapter.pdf

  6. Bharathula P, Mridula Menon N (2016) Equitable machine learning algorithms to probe over p2p botnets. In: Proceedings of the 4th international conference on frontiers in intelligent computing: theory and applications (FICTA) 2015, pp 13–21. Springer, New Delhi

    Google Scholar 

  7. Big Data, https://www.oracle.com/in/big-data/what-is-big-data.html

  8. Apache Hadoop, https://hadoop.apache.org/

  9. Apache Mahout, https://en.wikipedia.org/wiki/Apache_Mahout

  10. https://www.analyticsvidhya.com/blog/2017/09/common-machine-learning-algorithms/

  11. Hendawi AM, Alali F, Wang X, Guan Y, Zhou T, Liu X, Basit N, Stankovic JA (2016) Hobbits: Hadoop and Hive based internet traffic analysis. In: 2016 IEEE international conference on big data (BigData), Dec 2016, pp 2590–2599

    Google Scholar 

  12. Narang P, Thakur A, Hota C (2014) HaDeS: a Hadoop-based framework for detection of peer-to-peer botnets. In: Proceedings of the 20th international conference on management of data

    Google Scholar 

  13. Huseynov K, Kim K (2014) Unsupervised Hadoop-based p2p botnet detection with threshold setting. Department of Computer Science, Korea Advanced, Institute of Science and Technology

    Google Scholar 

  14. Zhang J, Perdisci R, Lee W, Luo X, Sarfraz U (2013) Building a scalable system for stealthy p2p-botnet detection. IEEE Trans Inf Forensics Secur 9(1):27–38

    Article  Google Scholar 

  15. Francois J, Wang S, Bronzi W, State R, Engel T (2011) Botcloud: detecting botnets using MapReduce. In: 2011 IEEE international workshop on information forensics and security. IEEE, pp 1–6

    Google Scholar 

  16. Khan, RU, Zhang X, Kumar R, Sharif A, Amiri Golilarz N, Alazab M (2018) An adaptive multi-layer botnet detection technique using machine learning classifiers. Appl Sci 9(11):2375

    Google Scholar 

  17. Singh K, Guntuku SC, Thakur A, Hota C (2014) Big data analytics framework for peer-to-peer botnet detection using random forests. Inf Sci 278:488–497

    Article  Google Scholar 

  18. RIPE-NCC, https://github.com/RIPE-NCC/hadoop-pcap

  19. https://peerush.cs.uga.edu/peerrush/

  20. Rahbarinia B, Perdisci R, Lanzi A, Li K (2013) Peerrush: mining for unwanted p2p traffic. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, Berlin, Heidelberg, pp 62–82

    Google Scholar 

  21. Storm botnet, https://en.wikipedia.org/wiki/Storm_botnet

  22. Zeus malware, https://en.wikipedia.org/wiki/Zeus_(malware)

  23. https://github.com/saitejapullepu/p2p-bot-detection-using-Bigdata

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Saravanan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sai Teja, P., Hema Sirija, P., Roshini, P., Saravanan, S. (2021). P2P Bot Detection Based on Host Behavior and Big Data Technology. In: Thampi, S.M., Lloret Mauri, J., Fernando, X., Boppana, R., Geetha, S., Sikora, A. (eds) Applied Soft Computing and Communication Networks. Lecture Notes in Networks and Systems, vol 187. Springer, Singapore. https://doi.org/10.1007/978-981-33-6173-7_11

Download citation

Publish with us

Policies and ethics