Research Article Open Access

A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES

Mohammed Jamil Elhalabi1, Selvakumar Manickam1, Loai Bani Melhim1, Mohammed Anbar1 and Huda Alhalabi1
  • 1 Universiti Sains Malaysia, Malaysia

Abstract

In recent years, Peer-to-Peer technology has an extensive use. Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks. They are used to make DDOS attacks, generate spam, click fraud and steal sensitive information. Compared with traditional botnets, P2P botnets are harder to be defended and hijacked. In this study we discuss various P2P botnet detection approaches and evaluate their effectiveness. We identify the advantages and shortcomings of each of the discussed techniques. This can guide the researchers to a better understanding of P2P botnets and easier for them developing more sufficient detection techniques. Our evaluation shows that each technique has its own advantages and limitations. Two or more detection techniques might be used together, in order to have a robust P2P botent detection.

Journal of Computer Science
Volume 10 No. 1, 2014, 169-177

DOI: https://doi.org/10.3844/jcssp.2014.169.177

Submitted On: 22 April 2013 Published On: 13 November 2013

How to Cite: Elhalabi, M. J., Manickam, S., Melhim, L. B., Anbar, M. & Alhalabi, H. (2014). A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES. Journal of Computer Science, 10(1), 169-177. https://doi.org/10.3844/jcssp.2014.169.177

  • 3,686 Views
  • 4,212 Downloads
  • 5 Citations

Download

Keywords

  • Peer to Peer
  • Botnet
  • P2P Botnet