Analysis of P2P, IRC and HTTP traffic for botnets detection

被引:15
作者
AsSadhan, Basil [1 ]
Bashaiwth, Abdulmuneem [2 ]
Al-Muhtadi, Jalal [3 ]
Alshebeili, Saleh [4 ]
机构
[1] King Saud Univ, Dept Elect Engn, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[2] King Saud Univ, Dept Elect Engn, Riyadh, Saudi Arabia
[3] King Saud Univ, Dept Comp Sci, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[4] King Saud Univ, Dept Elect Engn, KACST TIC RF & Photon E Soc RFTONICS, Riyadh, Saudi Arabia
关键词
Botnet C&C traffic detection; Peridoic behavior; Periodogram; IRC; P2P; Http;
D O I
10.1007/s12083-017-0586-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are widespread and have become a major threat to network security. A botnet is a group of infected computers that are controlled by a botmaster. Botnet's members use command and control (C&C) channels to communicate with their C&C server. In this paper, we study the detection of botnets by monitoring and analyzing botnets' C&C channels communication traffic. As bots are preprogramed to communicate every T seconds, we exploit this periodic behavior of C&C traffic to detect the botnet. The botnet detection approach we use is based on evaluating the periodogram of several count-feature sequences of the traffic and testing the significance of the peak of each periodogram. We apply this approach to real traffic that we captured from King Saud University's (KSU) network. The captured traffic contains more than 11 TB of traffic that spans 50 days during 2012 and 2013 from different locations inside KSU. We apply the detection approach to KSU's traffic to detect botnet C&C traffic that uses P2P, IRC, or HTTP as its communication protocols. The results show that the botnet detection approach can efficiently detect botnet members in recent traffic datasets. The period values of the detected bots ranged between 31 and 49 min.
引用
收藏
页码:848 / 861
页数:14
相关论文
共 37 条
  • [1] [Anonymous], IRC BOTNETS ARE NOT
  • [2] [Anonymous], SEC THREAT REP 2014
  • [3] [Anonymous], DAG 7 5G2 CARD US GU
  • [4] [Anonymous], PERL PROGRAMMING LAN
  • [5] [Anonymous], NETW TAPP TECHN OV V
  • [6] [Anonymous], ANN COMP SEC APPL C
  • [7] [Anonymous], J CHINA U POSTS TELE
  • [8] [Anonymous], 15 NETW DISTR SYST S
  • [9] [Anonymous], INT J COMPUT TELECOM
  • [10] [Anonymous], CYB APPL TECHN C HOM