Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests

被引:161
作者
Singh, Kamaldeep [1 ]
Guntuku, Sharath Chandra [2 ]
Thakur, Abhishek [1 ]
Hota, Chittaranjan [1 ]
机构
[1] BITS Pilani, Dept Comp Sci, Hyderabad 500078, Andhra Pradesh, India
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
Hadoop; Mahout; Peer-to-Peer; Botnet detection; Machine learning; Network security; SECURITY;
D O I
10.1016/j.ins.2014.03.066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network traffic monitoring and analysis-related research has struggled to scale for massive amounts of data in real time. Some of the vertical scaling solutions provide good implementation of signature based detection. Unfortunately these approaches treat network flows across different subnets and cannot apply anomaly-based classification if attacks originate from multiple machines at a lower speed, like the scenario of Peer-to-Peer Botnets. In this paper the authors build up on the progress of open source tools like Hadoop, Hive and Mahout to provide a scalable implementation of quasi-real-time intrusion detection system. The implementation is used to detect Peer-to-Peer Botnet attacks using machine learning approach. The contributions of this paper are as follows: (1) Building a distributed framework using Hive for sniffing and processing network traces enabling extraction of dynamic network features; (2) Using the parallel processing power of Mahout to build Random Forest based Decision Tree model which is applied to the problem of Peer-to-Peer Botnet detection in quasi-real-time. The implementation setup and performance metrics are presented as initial observations and future extensions are proposed. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:488 / 497
页数:10
相关论文
共 45 条
[1]  
Andrew Ng, 2013, ADVICE APPL MACHINE
[2]  
[Anonymous], 2008, BOTMINER CLUSTERING
[3]  
[Anonymous], CAIDA UCSD DATASET 2
[4]  
[Anonymous], 2013, MAHOUT PARTIAL IMPLE
[5]  
[Anonymous], 2013, ACM SIGCOMM Computer Communication Review
[6]  
[Anonymous], 2010, USENIX SECURITY 2010
[7]  
[Anonymous], INT J COMMUN NETW IN
[8]  
[Anonymous], 2013, TSHARK
[9]  
[Anonymous], 2002, The handbook of brain theory and neural networks
[10]  
[Anonymous], 2008, LEET