Unsupervised detection of botnet activities using frequent pattern tree mining

被引:4
作者
Hao, Siqiang [1 ]
Liu, Di [1 ]
Baldi, Simone [1 ,2 ]
Yu, Wenwu [1 ,2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Southeast Univ, Sch Math, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Botnet detection; Internet security; Frequent pattern tree; Data mining; IOT-BASED BOTNET; COMMUNICATION; ATTACKS;
D O I
10.1007/s40747-021-00281-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A botnet is a network of remotely-controlled infected computers that can send spam, spread viruses, or stage denial-of-service attacks, without the consent of the computer owners. Since the beginning of the 21st century, botnet activities have steadily increased, becoming one of the major concerns for Internet security. In fact, botnet activities are becoming more and more difficult to be detected, because they make use of Peer-to-Peer protocols (eMule, Torrent, Frostwire, Vuze, Skype and many others). To improve the detectability of botnet activities, this paper introduces the idea of association analysis in the field of data mining, and proposes a system to detect botnets based on the FP-growth (Frequent Pattern Tree) frequent item mining algorithm. The detection system is composed of three parts: packet collection processing, rule mining, and statistical analysis of rules. Its characteristic feature is the rule-based classification of different botnet behaviors in a fast and unsupervised fashion. The effectiveness of the approach is validated in a scenario with 11 Peer-to-Peer host PCs, 42063 Non-Peer-to-Peer host PCs, and 17 host PCs with three different botnet activities (Storm, Waledac and Zeus). The recognition accuracy of the proposed architecture is shown to be above 94%. The proposed method is shown to improve the results reported in literature.
引用
收藏
页码:761 / 769
页数:9
相关论文
共 32 条
[1]   Systematic Literature Review on IoT-Based Botnet Attack [J].
Ali, Ihsan ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Almogren, Ahmad ;
Raza, Muhammad Ahsan ;
Shah, Syed Attique ;
Khan, Anwar ;
Gani, Abdullah .
IEEE ACCESS, 2020, 8 :212220-212232
[2]  
Bawaneh MJ, 2016, INT J EMERG TRENDS T
[3]   Botnet Vulnerability Intelligence Clustering Classification Mining and Countermeasure Algorithm Based on Machine Learning [J].
Chu, Zenan ;
Han, Yi ;
Zhao, Kai .
IEEE ACCESS, 2019, 7 :182309-182319
[4]  
Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137
[5]   Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets [J].
Gil Perez, Manuel ;
Huertas Celdran, Alberto ;
Ippoliti, Fabrizio ;
Giardina, Pietro G. ;
Bernini, Giacomo ;
Alaez, Ricardo Marco ;
Chirivella-Perez, Enrique ;
Garcia Clemente, Felix J. ;
Martinez Perez, Gregorio ;
Kraja, Elian ;
Carrozzo, Gino ;
Calero, Jose M. Alcaraz ;
Wang, Qi .
IEEE INTERNET COMPUTING, 2017, 21 (05) :28-36
[6]  
Grizzard J.B., 2007, PEER TO PEER BOTNETS
[7]   Distributed Stabilization of Heterogeneous MASs in Uncertain Strong-Weak Competition Networks [J].
Hu, Hong-Xiang ;
Wen, Guanghui ;
Yu, Xinghuo ;
Wu, Zheng-Guang ;
Huang, Tingwen .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (03) :1755-1767
[8]   A Comprehensive Study of Email Spam Botnet Detection [J].
Khan, Wazir Zada ;
Khan, Muhammad Khurram ;
Bin Muhaya, Fahad T. ;
Aalsalem, Mohammed Y. ;
Chao, Han-Chieh .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2271-2295
[9]   Behavioral fine-grained detection and classification of P2P bots [J].
Kheir, Nizar ;
Han, Xiao ;
Wolley, Chirine .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (04) :217-233
[10]  
Kumar S., 1994, An Application of Pattern Matching in Intrusion Detection