Flow-based Identification of Botnet Traffic by Mining Multiple Log Files

被引:0
作者
Masud, Mohammad M. [1 ]
Al-Khateeb, Tahseen [1 ]
Khan, Latifur [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin W. [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75080 USA
来源
DFMA 2008: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS & APPLICATIONS, PROCEEDINGS | 2008年
关键词
Malware; botnet; intrusion detection; data mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected hosts (bots) to control the bots. If this traffic van be detected. both the C&C center and the bots it controls can be detected and the botnet can be. disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that hots respond much faster Than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect hot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.
引用
收藏
页码:200 / 206
页数:7
相关论文
共 28 条
  • [21] Data mining method based on HHT and application research in flow regime identification
    Sun, Bin
    Zhao, Yuxiao
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 5990 - +
  • [22] FEW-NNN: A Fuzzy Entropy Weighted Natural Nearest Neighbor Method for Flow-Based Network Traffic Attack Detection
    Chen, Liangchen
    Gao, Shu
    Liu, Baoxu
    Lu, Zhigang
    Jiang, Zhengwei
    CHINA COMMUNICATIONS, 2020, 17 (05) : 151 - 167
  • [23] Simulation of patient flow in multiple healthcare units using process and data mining techniques for model identification
    Kovalchuk, Sergey, V
    Funkner, Anastasia A.
    Metsker, Oleg G.
    Yakovlev, Aleksey N.
    JOURNAL OF BIOMEDICAL INFORMATICS, 2018, 82 : 128 - 142
  • [24] A novel Traffic flow Forecasting method based on the Artificial Neural Networks and Intelligent Transportation Systems data mining
    He, Wei
    Lu, Tao
    Yu, Chengqiang
    MATERIALS, MECHANICAL AND MANUFACTURING ENGINEERING, 2014, 842 : 708 - +
  • [25] Dynamic luminance tuning method for tunnel lighting based on data mining of real-time traffic flow
    Qin, Li
    Shi, Xuhua
    Leon, Arturo S.
    Tong, Chudong
    Ding, Chang
    BUILDING AND ENVIRONMENT, 2020, 176
  • [26] Dense traffic flow patterns mining in bi-directional road networks using density based trajectory clustering
    Vaishali Mirge
    Kesari Verma
    Shubhrata Gupta
    Advances in Data Analysis and Classification, 2017, 11 : 547 - 561
  • [27] Dense traffic flow patterns mining in bi-directional road networks using density based trajectory clustering
    Mirge, Vaishali
    Verma, Kesari
    Gupta, Shubhrata
    ADVANCES IN DATA ANALYSIS AND CLASSIFICATION, 2017, 11 (03) : 547 - 561
  • [28] Analysis of the Causes of Traffic Accidents and Identification of Accident-Prone Points in Long Downhill Tunnel of Mountain Expressways Based on Data Mining
    Wang, Fu
    Wang, Jing
    Zhang, Xianfeng
    Gu, Dengjun
    Yang, Yang
    Zhu, Hongbin
    SUSTAINABILITY, 2022, 14 (14)