Hybrid Botnet Detection Based on Host and Network Analysis

被引:24
作者
Almutairi, Suzan [1 ]
Mahfoudh, Saoucene [2 ]
Almutairi, Sultan [3 ]
Alowibdi, Jalal S. [4 ]
机构
[1] Tech & Vocat Corp, Riyadh, Saudi Arabia
[2] Dar Al Hekma Univ, Engn Comp & Informat, Jeddah, Saudi Arabia
[3] Technol Control Co, Riyadh, Saudi Arabia
[4] Univ Jeddah, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
关键词
COMMAND;
D O I
10.1155/2020/9024726
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. The size of the botnet is usually very large, and millions of infected hosts may belong to it. In this paper, we addressed the problem of botnet detection based on network's flows records and activities in the host. Thus, we propose a general technique capable of detecting new botnets in early phase. Our technique is implemented in both sides: host side and network side. The botnet communication traffic we are interested in includes HTTP, P2P, IRC, and DNS using IP fluxing. HANABot algorithm is proposed to preprocess and extract features to distinguish the botnet behavior from the legitimate behavior. We evaluate our solution using a collection of real datasets (malicious and legitimate). Our experiment shows a high level of accuracy and a low false positive rate. Furthermore, a comparison between some existing approaches was given, focusing on specific features and performance. The proposed technique outperforms some of the presented approaches in terms of accurately detecting botnet flow records within Netflow traces.
引用
收藏
页数:16
相关论文
共 33 条
[1]  
Abdullah R., 2014, EUROPEAN J SCI RES, V118, P75
[2]   A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks [J].
Alauthaman, Mohammad ;
Aslam, Nauman ;
Zhang, Li ;
Alasem, Rafe ;
Hossain, M. A. .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (11) :991-1004
[3]  
Almutairi S., 2016, 8 IFIP INT C NEW TEC, P1
[4]  
[Anonymous], 2015, ISCX BOTNET DATASET
[5]  
[Anonymous], 2018, DDOS ATTACKS Q1
[6]  
[Anonymous], 2016, IDENTIFYING P2P USER
[7]  
[Anonymous], ENCY CRYPTOGRAPHY SE
[8]  
Bayer Ulrich, 2009, P 2 USENIX C LARG SC
[9]  
BILGE L., 2011, P 18 ANN NETW DISTR
[10]  
Cusack B., 2014, P AUSTR DIG FOR C DE, P44