Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic

被引:10
|
作者
Shang, Yaoyao [1 ,2 ]
Yang, Shuangmao [2 ]
Wang, Wei [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, 3 Shangyuancun, Beijing 100044, Peoples R China
[2] Sci & Technol Elect Informat Control Lab, Chengdu 610036, Sichuan, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT II | 2018年 / 11064卷
关键词
Botnet detection; Network traffic; Network security; AUDIT DATA STREAMS; BEHAVIOR; APPS;
D O I
10.1007/978-3-030-00009-7_55
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Botnets have become one of the most serious threats to cyber infrastructure. Many existing botnet detection approaches become invalid due to botnet structure sophistication or encryption of payload of the traffic. In this work, we propose an effective anomaly-based botnet detection method by hybrid analysis of flow based and graph-based features of network traffic. Frist, from network traffic we extract 15 statistical aggregated flow based features as well as 7 types of graph based features, such as in degree, out degree, in degree weight, out degree weight, node betweenness centrality, local clustering coefficient and PageRank. Second, we employ K-means, k-NN and One-class SVM to detect bots based on the hybrid analysis of these two types of features. Finally, we collect a large size of network traffic in real computing environment by implementing 5 different botnets including newly propagated Mirai and others like Athena and Black energy. The extensive experimental results show that our method based on the hybrid analysis is better than the method of individual analysis in terms of detection accuracy. It achieves the best performance with 96.62% of F-score. The experimental results also demonstrate the effectiveness of our method on the detection of novel botnets like Mirai, Athena and Black energy.
引用
收藏
页码:612 / 621
页数:10
相关论文
共 50 条
  • [31] Botnet Detection Approach Using Graph-Based Machine Learning
    Alharbi, Afnan
    Alsubhi, Khalid
    IEEE ACCESS, 2021, 9 (09): : 99166 - 99180
  • [32] Correlation-Based HTTP Botnet Detection Using Network Communication Histogram Analysis
    Naseri, Maryam Var
    Abidin, Wardah Zainal
    Eslahi, Meisam
    2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), 2017, : 7 - 12
  • [33] Fast-flux Botnet Detection from Network Traffic
    Paul, Tuhin
    Tyagi, Rohit
    Manoj, B. S.
    Thanudas, B.
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [34] Anomaly Detection of Network Traffic Based on Flow Time Influence Domain
    Xu J.-Q.
    Zhou Y.-Y.
    Wang J.-F.
    Zhao H.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (01): : 26 - 31
  • [35] BotCVD: Visual analysis of DNS traffic for botnet detection
    Jiang, H. (hellojhl@163.com), 1600, Advanced Institute of Convergence Information Technology (04): : 264 - 273
  • [36] Overview of Botnet Detection Based on Machine Learning
    Dong Xiaxin
    Hu Jianwei
    Cui Yanpeng
    2018 3RD INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE), 2018, : 476 - 479
  • [37] Botnet Detection based on Fuzzy Association Rules
    Lu, Jiazhong
    Lv, Fengmao
    Liu, Quan-Hui
    Zhang, Malu
    Zhang, Xiaosong
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 578 - 584
  • [38] Collaboration-based Botnet Detection Architecture
    Wang, Hailong
    Gong, Zhenghu
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 375 - 378
  • [39] BotCapturer: Detecting botnets based on two-layered analysis with graph anomaly detection and network traffic clustering
    Wang W.
    Wang Y.
    Tan X.
    Liu Y.
    Yang S.
    Wang, Wei (wangwei1@bjtu.edu.cn), 2018, Totem Publishers Ltd (14) : 1050 - 1059
  • [40] A Novel Traffic Analysis Model for Botnet Discovery in Dynamic Network
    P. Panimalar
    K. Rameshkumar
    Arabian Journal for Science and Engineering, 2019, 44 : 3033 - 3042