Title

Detecting centralized architecture-based botnets using travelling salesperson non-deterministic polynomial-hard problem-TSP-NP technique

Document Type

Conference Proceeding

Publication Title

2019 IEEE Conference on Application, Information and Network Security (AINS)

Publisher

IEEE

School

School of Science / ECU Security Research Institute

RAS ID

45350

Comments

Al-Ghushami, A., Karie, N., & Kebande, V. (2019). Detecting centralized architecture-based botnets using travelling salesperson non-deterministic polynomial-hard problem-TSP-NP technique. In 2019 IEEE Conference on Application, Information and Network Security (AINS) (pp. 77-81). IEEE. https://doi.org/10.1109/AINS47559.2019.8968710

Abstract

The threats posed by botnets in the cyber-space continues to grow each day and it has become very hard to detect or infiltrate bots given that the botnet developers each day keep changing the propagation and attack techniques. Currently, most of these attacks have been centered on stealing computing energy, theft of personal information and Distributed Denial of Service (DDoS attacks). In this paper, the authors propose a novel technique that uses the Non-Deterministic Polynomial-Time Hardness (NP-Hard Problem) based on the Traveling Salesperson Person (TSP) that depicts that a given bot, b j , is able to visit each host on a network environment, NE, and then it returns to the botmaster in form of instruction(command) through optimal minimization of the hosts that are or may be attacked. Given that b j represents a piece of malicious code and based on TSP-NP Hard Problem which forms part of combinatorial optimization, the authors present an effective approach for the detection of the botnet. It is worth noting that the concentration of this study is basically on the centralized botnet architecture. This holistic approach shows that botnet detection accuracy can be increased with a degree of certainty and potentially decrease the chances of false positives. Nevertheless, a discussion on the possible applicability and implementation has also been given in this paper.

DOI

10.1109/AINS47559.2019.8968710

Access Rights

subscription content

Share

 
COinS