Botnet, a network of computers infected with malware - so-called zombies - that allow a third party to take control of those machines can be detected using a statistical tool first published in 1966, according to researchers from PSG College of Technology, Coimbatore.
In a study published in the International Journal of Electronic Security and Digital Forensics, researchers wrote that millions of computers across the globe are infected with malware, despite the best efforts of public awareness campaigns about phishing attacks and antivirus software.
Security and software companies do monitor internet activity and there have been successes in destroying such botnets but malware writers are always developing new tools and techniques that allow them to infect unprotected computers and rebuild botnets, researchers said.
Researcher R Anitha and colleagues at PSG College of Technology have turned to a statistical tool known as the hidden semi-Markov model (HsMM) to help them develop monitoring software to detect botnet activity on a computer.
In probability theory and statistics, a Markov process is one in which someone can predict the next state of a process based on its current state without knowing the full history of the process.
A hidden-Markov model would thus include variables of which the observer has no sight but can infer and so predict an outcome.
Predicting whether it rained on a given day based on whether a fair-weather-only walker was out on a given day without you having a weather report for their area involves a hidden-Markov process.
A hidden semi-Markov model then involves a process of this sort but where the time-elapsed into the current state affects the prediction.
The team has applied the statistical logic of the hidden semi-Markov model to forecast the characteristics of internet activity on a given computer suspected of being a "zombie computer" in a botnet based on management information base (MIB) variables.
These variables are the components used to control the flow of data packets in and out of the computer via the internet protocol.
Their approach can model the "normal" behaviour and then highlight botnet activity as being a deviation from the normal without the specific variables that are altered by the malware being in plain sight.
Tests on a small zombie computer network shows that the hidden semi-Markov model researchers have developed as a lightweight and real-time detection system can see through this disguise easily.
If implemented widely such a system could lock down this kind of botnet very quickly and slow the assimilation of zombie computers by criminals and others with malicious intent, researchers said.
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
