{"title":"Detecting Botnets in Computer Networks Using Multi-agent Technology","authors":"M. Szymczyk","doi":"10.1109/DepCoS-RELCOMEX.2009.46","DOIUrl":null,"url":null,"abstract":"The paper presents a hybrid model of the bots detector which is a combination of host intrusion detection system and the operating system event log analyzer. Bot can be defined as a computer that have been attacked by a hacker or infected with malicious software and is used for illegal activities. Collections of infected computers form a botnet. The proposed system is used to detect bots based on the evaluation of events occurring in the operating system and network environment. Detection algorithms based on the signatures derived from the analysis of the various types of malicious software that creates bots. The model has been implemented using multi-agent technology.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Dependability of Computer Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.46","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26
Abstract
The paper presents a hybrid model of the bots detector which is a combination of host intrusion detection system and the operating system event log analyzer. Bot can be defined as a computer that have been attacked by a hacker or infected with malicious software and is used for illegal activities. Collections of infected computers form a botnet. The proposed system is used to detect bots based on the evaluation of events occurring in the operating system and network environment. Detection algorithms based on the signatures derived from the analysis of the various types of malicious software that creates bots. The model has been implemented using multi-agent technology.