Flow-based Identification of Botnet Traffic by Mining Multiple Log Files

被引:0
|
作者
Masud, Mohammad M. [1 ]
Al-Khateeb, Tahseen [1 ]
Khan, Latifur [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin W. [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75080 USA
来源
DFMA 2008: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS & APPLICATIONS, PROCEEDINGS | 2008年
关键词
Malware; botnet; intrusion detection; data mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected hosts (bots) to control the bots. If this traffic van be detected. both the C&C center and the bots it controls can be detected and the botnet can be. disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that hots respond much faster Than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect hot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.
引用
收藏
页码:200 / 206
页数:7
相关论文
共 28 条
  • [1] Machine learning based Botnet Identification Traffic
    Azab, Ahmad
    Alazab, Mamoun
    Aiash, Mahdi
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1788 - 1794
  • [2] BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
    Wang, Wei
    Shang, Yaoyao
    He, Yongzhong
    Li, Yidong
    Liu, Jiqiang
    INFORMATION SCIENCES, 2020, 511 : 284 - 296
  • [3] ARCHITECTURE FOR APPLYING DATA MINING AND VISUALIZATION ON NETWORK FLOW FOR BOTNET TRAFFIC DETECTION
    Shahrestani, Alireza
    Feily, Maryam
    Ahmad, Rodina
    Ramadass, Sureswaran
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 1, 2009, : 33 - +
  • [4] Botnet Identification Based on Flow Traffic by Using K-Nearest Neighbor
    Gunawan, Dani
    Hairani, Tika
    Hizriadi, Ainul
    2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS 2019), 2019, : 95 - 99
  • [5] Botnet detection based on traffic behavior analysis and flow intervals
    Zhao, David
    Traore, Issa
    Sayed, Bassam
    Lu, Wei
    Saad, Sherif
    Ghorbani, Ali
    Garant, Dan
    COMPUTERS & SECURITY, 2013, 39 : 2 - 16
  • [6] An efficient flow-based botnet detection using supervised machine learning
    Stevanovic, Matija
    Pedersen, Jens Myrup
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 797 - 801
  • [7] A Distributed Botnet Detecting Approach Based on Traffic Flow Analysis
    Li Sheng
    Liu Zhiming
    He Jin
    Deng Gaoming
    Huang Wen
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 124 - 128
  • [8] Flow Based Botnet Traffic Detection Using Machine Learning
    Gahelot, Parul
    Dayal, Neelam
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 418 - 426
  • [9] Dynamic traffic prediction based on traffic flow mining
    Wang, Yaqin
    Chen, Yue
    Qin, Minggui
    Zhu, Yangyong
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 6078 - +
  • [10] Method of detecting IRC Botnet based on the multi-features of traffic flow
    Yan, Jian-En
    Yuan, Chun-Yang
    Xu, Hai-Yan
    Zhang, Zhao-Xin
    Tongxin Xuebao/Journal on Communications, 2013, 34 (10): : 49 - 55+64