Botnet detection based on traffic behavior analysis and flow intervals

被引:202
作者
Zhao, David [1 ]
Traore, Issa [1 ]
Sayed, Bassam [1 ]
Lu, Wei [2 ]
Saad, Sherif [1 ]
Ghorbani, Ali [4 ]
Garant, Dan [3 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 3P6, Canada
[2] Keene State Coll, Univ Syst New Hampshire, Keene, NH USA
[3] Keene State Coll, Keene, NH USA
[4] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
关键词
Botnet; Intrusion detection; Traffic behavior analysis; Network flows; Machine learning;
D O I
10.1016/j.cose.2013.04.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets represent one of the most serious cybersecurity threats faced by organizations today. Botnets have been used as the main vector in carrying many cyber crimes reported in the recent news. While a significant amount of research has been accomplished on botnet analysis and detection, several challenges remain unaddressed, such as the ability to design detectors which can cope with new forms of botnets. In this paper, we propose a new approach to detect botnet activity based on traffic behavior analysis by classifying network traffic behavior using machine learning. Traffic behavior analysis methods do not depend on the packets payload, which means that they can work with encrypted network communication protocols. Network traffic information can usually be easily retrieved from various network devices without affecting significantly network performance or service availability. We study the feasibility of detecting botnet activity without having seen a complete network flow by classifying behavior based on time intervals. Using existing datasets, we show experimentally that it is possible to identify the presence of existing and unknown botnets activity with high accuracy even with very small time windows. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2 / 16
页数:15
相关论文
共 29 条
[1]  
Al-Duwairi Basheer, 2010, Proceedings of the Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), P16, DOI 10.1109/ICIMP.2010.11
[2]  
[Anonymous], 2008, UTDCS0508
[3]  
[Anonymous], P 1 USENIX WORKSH LA
[4]  
[Anonymous], 2010, J NETW
[5]  
[Anonymous], 2006, P 6 ACM SIGCOMM C IN
[6]   A Survey of Botnet and Botnet Detection [J].
Feily, Maryam ;
Shahrestani, Alireza ;
Ramadass, Sureswaran .
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, :268-+
[7]   A Novel P2P Traffic Identification Scheme Based on Support Vector Machine Fuzzy Network [J].
Gao, Zhong ;
Lu, Guanming ;
Gu, Daquan .
WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, :909-+
[8]  
Giroire F, 2009, LECT NOTES COMPUT SC, V5758, P326, DOI 10.1007/978-3-642-04342-0_17
[9]  
GRIZZARD JB, 2007, P 1 WORKSH HOT TOP U
[10]  
Gu G, 2008, P 17 USENIX SEC S SA