The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks

被引:14
作者
Abaid, Zainab [1 ,2 ]
Sarkar, Dilip [3 ]
Kaafar, Mohamed Ali [2 ]
Jha, Sanjay [1 ]
机构
[1] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia
[2] CSIRO, Data61, Canberra, ACT, Australia
[3] Univ Miami, Dept Comp Sci, Coral Gables, FL 33124 USA
来源
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN) | 2016年
关键词
D O I
10.1109/LCN.2016.17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet threats include a plethora of possible attacks ranging from distributed denial of service (DDoS), to drive-by-download malware distribution and spam. While for over two decades, techniques have been proposed for either improving accuracy or speeding up the detection of attacks, much of the damage is done by the time attacks are contained. In this work we take a new direction which aims to predict forthcoming attacks (i.e. before they occur), providing early warnings to network administrators who can then prepare to contain them as soon as they manifest or simply quarantine hosts. Our approach is based on modelling the Botnet infection sequence as a Markov chain with the objective of identifying behaviour that is likely to lead to attacks. We present the results of applying a Markov model to real world Botnets' data, and show that with this approach we are successfully able to predict more than 98% of attacks from a variety of Botnet families with a very low false alarm rate.
引用
收藏
页码:61 / 68
页数:8
相关论文
共 21 条
[1]  
[Anonymous], 2008, BOTMINER CLUSTERING
[2]  
[Anonymous], 2007, USENIX SECUR
[3]  
Beigi EB, 2014, IEEE CONF COMM NETW, P247, DOI 10.1109/CNS.2014.6997492
[4]   Detecting Spam Zombies by Monitoring Outgoing Messages [J].
Duan, Zhenhai ;
Chen, Peng ;
Sanchez, Fernando ;
Dong, Yingfei ;
Stephenson, Mary ;
Barker, James Michael .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) :198-210
[5]  
Gobel W., DETECTING BOTNETS US
[6]  
Haq O, 2015, IEEE ICC, P5278, DOI 10.1109/ICC.2015.7249162
[7]  
Hirasawa T., 2015, INT TOP M MICR PHOT, P1
[8]   A hybrid high-order Markov chain model for computer intrusion detection [J].
Ju, WH ;
Vardi, Y .
JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 2001, 10 (02) :277-295
[9]  
Jung J, 2004, P IEEE S SECUR PRIV, P211
[10]  
Khattak S., 2013, P 2013 ACM SIGSAC C, P1387