Fast-flux Botnet Detection from Network Traffic

被引:0
作者
Paul, Tuhin [1 ]
Tyagi, Rohit [1 ]
Manoj, B. S. [1 ]
Thanudas, B. [2 ]
机构
[1] Indian Inst Space Sci & Technol, Thiruvananthapuram, Kerala, India
[2] ISRO, Vikram Sarabhai Space Ctr, Thiruvananthapuram, Kerala, India
来源
2014 ANNUAL IEEE INDIA CONFERENCE (INDICON) | 2014年
关键词
Botnet; botnet detection; fast-flux; clustering; power spectral density;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
HTTP botnets have been a major threat to cyber security in recent years. Fast-flux technique can be detrimental to botnet detection techniques based on traffic analysis, due to its ability to hide bot traffic among normal traffic. In this paper we propose a new approach to detect hosts infected by HTTP bots. Our technique will not only detect traditional HTTP botnets but also fast-flux botnet traffic by analyzing network traffic data. The first stage of this approach is to cluster similar packets from traffic data irrespective of their origin, thus separating out traffic from a single botnet in one of the clusters. The second stage is to analyze the timing of the packets using power spectral density to identify any hidden patterns present in them. If similar packets belong to many destination addresses arrive, following a pattern, the traffic can be considered to be suspicious and the host, that originates these packets, may be infected by a bot with a fast-flux command and control server. Our technique can be easily applied to analyze the traffic of a single personal computer as well as a group of computers in an enterprise. It has detected malicious packets with a high sensitivity of 95.8% for traffic of more than five hours and a low false positive rate of 1.6% at the worst.
引用
收藏
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 2011, NDSS
[2]  
[Anonymous], 2010, P 5 INT S INF COMP C, DOI DOI 10.1145/1755688.1755702
[3]  
[Anonymous], 2008, P 15 ANN NETW DISTR
[4]  
Ashley D., 2011, TECHNICAL REPORT
[5]  
Campbell S., 2011, Conferences in Research and Practice in Information Technology Series, V116, P57
[6]  
Hsu CH, 2010, LECT NOTES COMPUT SC, V6307, P464, DOI 10.1007/978-3-642-15512-3_24
[7]  
Lu C., 2011, P ACM WORKSH CYB SEC
[8]  
Nazario J, 2008, MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P29
[9]  
Passerini E, 2008, LECT NOTES COMPUT SC, V5137, P186, DOI 10.1007/978-3-540-70542-0_10
[10]   Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces [J].
Perdisci, Roberto ;
Corona, Igino ;
Dagon, David ;
Lee, Wenke .
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, :311-+