An adaptive framework for the detection of novel botnets

被引:18
作者
Cid-Fuentes, Javier Alvarez [1 ]
Szabo, Claudia [1 ]
Falkner, Katrina [1 ]
机构
[1] Univ Adelaide, Sch Comp Sci, Adelaide, SA, Australia
关键词
Botnet detection; Network analysis; Network security; Anomaly detection; Traffic analysis;
D O I
10.1016/j.cose.2018.07.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting and disrupting botnet activities is critical for the reliability, availability and security of Internet services. However, despite many efforts in this direction, key challenges remain. These include the high computational requirements of processing large amounts of network information, the similarity between botnet and normal traffic, and the constant creation of new botnet mechanisms to bypass current detection approaches. Because of these challenges, existing detection approaches have difficulties in detecting novel botnets with high accuracy and low false positive rate. In this paper, we address this problem with an scalable and decentralized framework. Our framework creates a complete characterization of the behavior of legitimate hosts that can be used to discover previously unseen botnet traffic. Moreover, our framework dynamically adapts to changes in network traffic, and is capable of detecting novel botnets without any assumption on their architecture or protocols employed. This is crucial to nullify the constant efforts by botnet managers to adapt to current detection techniques. Through an experimental analysis using the most realistic and varied publicly available botnet dataset, we find that our framework can detect bots in a network with 1.00 TPR and 0.082 FPR or, alternatively, can detect half of the malicious hosts with a FPR as low as 0.0017. These results significantly improve the results reported by similar works in the area, with the added value of not relying on historical botnet data or specific architectures and protocols. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:148 / 161
页数:14
相关论文
共 38 条
[21]  
Mirai, HACK REL SOURC COD P
[22]  
Mohri M., 2012, Foundations of machine learning
[23]  
Nagaraja S, 2010, P 19 USENIX SEC S
[24]  
Oikarinen J, 1993, TECHNICAL REPORT
[25]   Detecting P2P Botnets through Network Behavior Analysis and Machine Learning [J].
Saad, Sherif ;
Traore, Issa ;
Ghorbani, Ali ;
Sayed, Bassam ;
Zhao, David ;
Lu, Wei ;
Felix, John ;
Hakimian, Payman .
2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, :174-180
[26]   Pegasos: primal estimated sub-gradient solver for SVM [J].
Shalev-Shwartz, Shai ;
Singer, Yoram ;
Srebro, Nathan ;
Cotter, Andrew .
MATHEMATICAL PROGRAMMING, 2011, 127 (01) :3-30
[27]   Botnets: A survey [J].
Silva, Sergio S. C. ;
Silva, Rodrigo M. P. ;
Pinto, Raquel C. G. ;
Salles, Ronaldo M. .
COMPUTER NETWORKS, 2013, 57 (02) :378-403
[28]  
Stinson E, 2007, LECT NOTES COMPUT SC, V4579, P89
[29]   Evolution, Detection and Analysis of Malware for Smart Devices [J].
Suarez-Tangil, Guillermo ;
Tapiador, Juan E. ;
Peris-Lopez, Pedro ;
Ribagorda, Arturo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02) :961-987
[30]   Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart [J].
Yen, Ting-Fang ;
Reiter, Michael K. .
2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,