International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064

Downloads: 91

Research Paper | Software Engineering | India | Volume 3 Issue 9, September 2014

Malware Seeker: A Network Intrusion Detection and Correlation Technique against Peer to Peer Botnet

A. Shameem | M. Parveentaj [5]

Abstract: Current research has been carried out against Malware propagating in the Peer to Peer parallel distributed system is challenging and cumbersome task. In Existing solutions, lot of efforts has been carried against the malware evolution and activities but solutions are ineffective against the detection rate and accuracy in detection due to growing of high traffic calls to the networks. In this paper, we propose a novel Solution to mitigate the malicious activities of peer to peer Botnet attackers through the detection mechanism and countermeasure strategies named as Malware Seeker. To prevent vulnerable Host machines from being compromised by the peer to peer Malware, we propose a multiphase distributed vulnerability detection through the Principle of component analysis of each traffic data, measurement and countermeasure selection mechanism called Malware Seeker which is built on attack graph-based analytical models based on classification process and reconfigurable against update solutions to virtual network-based countermeasures with respect to command and Control established by botmaster. The proposed framework leverages hierarchical models to build a monitor and control process to classify the network traffic data to the virtual machine to significantly improve attack detection and mitigate attack consequences such as spamming, scanning an exploitation. Extensive Evaluation will demonstrate the behaviors of the proposed System against the Malware in file sharing process with legitimate and illegitimate and Malware causes in the peer to peer network process with huge amount of network information.

Keywords: Intrusion Detection, Peer to Peer Network, BOTNET, DDOS, Network Security, Attack Correlation

Edition: Volume 3 Issue 9, September 2014,

Pages: 2320 - 2324

How to Cite this Article?

A. Shameem, M. Parveentaj, "Malware Seeker: A Network Intrusion Detection and Correlation Technique against Peer to Peer Botnet", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 2320-2324,

How to Share this Article?

Enter Your Email Address

Similar Articles with Keyword 'Detection'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Software Engineering, United Arab Emirates, Volume 11 Issue 6, June 2022

Pages: 200 - 202

Detecting Fire using Low - Cost Digital Camera

Hamad Hamdan Sayyah

Share this Article

Downloads: 101

Survey Paper, Software Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1889 - 1895

A Comprehensive Survey of Recent Developments in Software Testing Methodologies

C. Prakasa Rao | P. Govindarajulu

Share this Article