Botnet sequential activity detection with hybrid analysis

被引:1
作者
Putra, Muhammad Aidiel Rachman [1 ]
Ahmad, Tohari [1 ]
Hostiadi, Dandy Pramana [2 ]
Ijtihadie, Royyana Muslim [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Kampus ITS Keputih Sukolilo, Surabaya 60111, Indonesia
[2] Inst Teknol dan Bisnis STIKOM Bali, Dept Magister Informat Syst, Bali 80234, Indonesia
关键词
Botnet detection; Network infrastructure; Network security; Information security; Sequential pattern mining;
D O I
10.1016/j.eij.2024.100440
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Botnet is one type of malware that infects devices to carry out illegal activities controlled by a botmaster. Many previous studies detected botnets as a single activity while botnet activities were related. This paper focused on detecting host botnets by analyzing the linkages between each activity on a network. The research proposed a novel method combining sequential pattern mining, feature engineering, and hybrid analysis. The goal is to forensically discover network actors suspected of being botnets by analyzing interrelated network activity. Compared to other methods, the proposed approach provides more stable performance in identifying botnet and non-botnet activities. Besides, the experiment also tested the processing time and obtained optimal performance. The experiment uses three datasets and shows on average 97.71% of accuracy, 94.42% of recall, 94.42% of TPR, 97.96% of TNR, 2.29% of FPR, 5.58% of FNR, and 800.94 s of time processing. Furthermore, this model can help network admins forensically analyze botnet attacks on computer networks.
引用
收藏
页数:17
相关论文
共 55 条
[1]  
Abrantes Rodrigo, 2022, Procedia Computer Science, P133, DOI 10.1016/j.procs.2021.11.082
[2]   The evolution of Mirai botnet scans over a six-year period [J].
Affinito, Antonia ;
Zinno, Stefania ;
Stanco, Giovanni ;
Botta, Alessio ;
Ventre, Giorgio .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
[3]  
Al-Hakbani MM, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), P13
[4]  
Alshamkhany Mustafa, 2020, 2020 14th International Conference on Innovations in Information Technology (IIT), P203, DOI 10.1109/IIT50501.2020.9299061
[5]  
Apostol I., 2022, 2022 14 INT C EL COM, P1, DOI [10.1109/ECAI54874.2022.9847442, DOI 10.1109/ECAI54874.2022.9847442]
[6]   Detecting botnet by using particle swarm optimization algorithm based on voting system [J].
Asadi, Mehdi ;
Jamali, Mohammad Ali Jabraeil ;
Parsa, Saeed ;
Majidnezhad, Vahid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :95-111
[7]  
Beigi EB, 2014, IEEE CONF COMM NETW, P247, DOI 10.1109/CNS.2014.6997492
[8]  
Choi H., 2009, 4 INT ICST C COMM SY
[9]   Botnet detection by monitoring group activities in DNS traffic [J].
Choi, Hyunsang ;
Lee, Hanwoo ;
Lee, Heejo ;
Kim, Hyogon .
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, :715-720
[10]   Botnet detection using graph-based feature clustering [J].
Chowdhury S. ;
Khanzadeh M. ;
Akula R. ;
Zhang F. ;
Zhang S. ;
Medal H. ;
Marufuzzaman M. ;
Bian L. .
Journal of Big Data, 2017, 4 (01)