• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jin Xin, Li Runheng, Gan Liang, Li Zhengyi. IRC Botnets’ Homology Identifying Method Based on Dynamic Time Warping Distance of Communication Feature Curves[J]. Journal of Computer Research and Development, 2012, 49(3): 481-490.
Citation: Jin Xin, Li Runheng, Gan Liang, Li Zhengyi. IRC Botnets’ Homology Identifying Method Based on Dynamic Time Warping Distance of Communication Feature Curves[J]. Journal of Computer Research and Development, 2012, 49(3): 481-490.

IRC Botnets’ Homology Identifying Method Based on Dynamic Time Warping Distance of Communication Feature Curves

More Information
  • Published Date: March 14, 2012
  • IRC botnet can be regarded as a collection of compromised computers (called Zombie computers) running software under the commandandcontrol infrastructure constructed by IRC server. The connection between botnet server and bots are usually very dynamic. In order to describe a botnet at a finer granularity, some work identify homologous IRC botnets based on similarity of IRC botnets. The similarity of IRC botnets are measured by multidimensional data obtained from the infiltrated botnets, that is, some information, such as server version, IP address of IRC server, DNS name of IRC server, IRC server/network name, and botmaster ID, can be obtained by joining the command and control channel.Because such information doesn’t represent the essential characteristic of botnets, and with the upgrade of server version, obtaining the information such as botmaster ID becomes more difficult and the error ratio of the model is hard to be bounded. A method is proposed, which identifies homologous botnets by extracting communication feature curves and computs the dynamic time warping distance between the curves, distills and uses the feature points of communication curves to increase the precision, and uses improved LB_PAA to reduce calculated amount. Experiments were carried out and the error rates were evaluated and shown.
  • Related Articles

    [1]Wu Yue, Yuan Yongzhe, Yue Mingyu, Gong Maoguo, Li Hao, Zhang Mingyang, Ma Wenping, Miao Qiguang. Feature Mining Method of Multi-Dimensional Information Fusion in Point Cloud Registration[J]. Journal of Computer Research and Development, 2022, 59(8): 1732-1741. DOI: 10.7544/issn1000-1239.20220042
    [2]Guo Yaqing, Wang Wenjian, Su Meihong. An Adaptive Regression Feature Selection Method for Datasets with Outliers[J]. Journal of Computer Research and Development, 2019, 56(8): 1695-1707. DOI: 10.7544/issn1000-1239.2019.20190313
    [3]Zhang Huijie, Liu Yaxin, Ma Zhiqiang, He Xinting, Bao Ning. A Terrain Skeleton Feature Extraction Method Based on Morphological Encoding[J]. Journal of Computer Research and Development, 2015, 52(6): 1409-1423. DOI: 10.7544/issn1000-1239.2015.20131422
    [4]Su Weixing, Zhu Yunlong, Liu Fang, Hu Kunyuan. Outliers and Change-Points Detection Algorithm for Time Series[J]. Journal of Computer Research and Development, 2014, 51(4): 781-788.
    [5]Cao Shixiang, Jiang Jie, Zhang Guangjun, and Yuan Yan. Multi-Scale Image Mosaic Using Features from Edge[J]. Journal of Computer Research and Development, 2011, 48(9): 1788-1793.
    [6]Zhi Lijia, Zhang Shaomin, Zhao Dazhe, Zhao Hong. Minimum Spanning Tree Fusing Multi-Feature Point Information for Medical Image Registration[J]. Journal of Computer Research and Development, 2011, 48(3): 501-507.
    [7]Lou Oujun. Feature Point Based Image Watermarking Scheme in Contourlet Domain Against Geometrical Attacks[J]. Journal of Computer Research and Development, 2010, 47(1): 113-120.
    [8]Wang Xiangyang, Hou Limin, Yang Hongying. A Robust Watermarking Scheme Based on Image Feature and PseudoZernike Moments[J]. Journal of Computer Research and Development, 2008, 45(5): 772-778.
    [9]Li Ying, Lai Jianhuang, Yuen Pongchi. Multi-Template ASM and Its Application in Facial Feature Points Detection[J]. Journal of Computer Research and Development, 2007, 44(1): 133-140.
    [10]Wang Xingyuan and Shi Qijiang. An Image Authentication Algorithm Based on Feature of Original Image and Hyperchaotic Iteration[J]. Journal of Computer Research and Development, 2005, 42(11): 1896-1902.

Catalog

    Article views (742) PDF downloads (507) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return