BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors

被引:142
|
作者
Wang, Wei [1 ,2 ]
Shang, Yaoyao [1 ,2 ]
He, Yongzhong [1 ,2 ]
Li, Yidong [1 ,2 ]
Liu, Jiqiang [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, 3 Shangyuancun, Beijing 100044, Peoples R China
[2] Beijing Jiaotong Univ, Sch Comp & Informat Technol, 3 Shangyuancun, Beijing 100044, Peoples R China
关键词
Botnet detection; Network security; Intrusion detection; Network monitoring; Machine learning; AUDIT DATA STREAMS; INTRUSION; ANOMALIES; FEATURES;
D O I
10.1016/j.ins.2019.09.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Botnets have become one of the most serious threats to cyber infrastructure. Most existing work on detecting botnets is based on flow-based traffic analysis by mining their communication patterns. There also exists related work based on anomaly detection in communication graphs. As bots have continuously evolved and become increasingly sophisticated, only using flow-based traffic analysis or graph-based analysis for the detection would result in false negatives or false positives, or can even be evaded. In this work, we propose BotMark, an automated model that detects botnets with hybrid analysis of flow-based and graph-based network traffic behaviors. We extract 15 statistical flow-based traffic features as well as 3 graph-based features in building the detection model. For flow-based detection, we consider the similarity and stability of C-flow as measurements in the detection. In particular, we employ k-means to measure the similarity of C-flows and assign similarity scores, and calculate stability score of C-flows through the distribution of packet length within a C-flow. The graph-based detection is based on the observation that the neighborhoods of anomalous nodes significantly differ from those of normal nodes in communication graphs. In particular, we use least-square technique and Local Outlier Factor (LOF) to calculate anomaly scores that measure the differences of their neighborhoods. Our models use the scores to mark bots. BotMark performs automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors by ensemble of the detection results based on similarity scores, stability scores and anomaly scores. We collect a very large size of network traffic by simulating 5 newly propagated botnets, including Mirai, Black energy, Zeus, Athena and Ares in a real computing environment. Extensive experimental results demonstrate the effectiveness of BotMark. It achieves 99.94% in terms of detection accuracy, outperforming any individual detector with flow-based detection or graph-based detection. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:284 / 296
页数:13
相关论文
共 50 条
  • [1] Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic
    Shang, Yaoyao
    Yang, Shuangmao
    Wang, Wei
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 612 - 621
  • [2] Botnet Detection Approach Using Graph-Based Machine Learning
    Alharbi, Afnan
    Alsubhi, Khalid
    IEEE ACCESS, 2021, 9 (09): : 99166 - 99180
  • [3] A review on graph-based approaches for network security monitoring and botnet detection
    Sofiane Lagraa
    Martin Husák
    Hamida Seba
    Satyanarayana Vuppala
    Radu State
    Moussa Ouedraogo
    International Journal of Information Security, 2024, 23 : 119 - 140
  • [4] A review on graph-based approaches for network security monitoring and botnet detection
    Lagraa, Sofiane
    Husak, Martin
    Seba, Hamida
    Vuppala, Satyanarayana
    State, Radu
    Ouedraogo, Moussa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 119 - 140
  • [5] Botnet detection based on traffic behavior analysis and flow intervals
    Zhao, David
    Traore, Issa
    Sayed, Bassam
    Lu, Wei
    Saad, Sherif
    Ghorbani, Ali
    Garant, Dan
    COMPUTERS & SECURITY, 2013, 39 : 2 - 16
  • [6] An efficient flow-based botnet detection using supervised machine learning
    Stevanovic, Matija
    Pedersen, Jens Myrup
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 797 - 801
  • [7] Ensemble Network Graph-Based Classification for Botnet Detection Using Adaptive Weighting and Feature Extraction
    Putra, Muhammad Aidiel Rachman
    Ahmad, Tohari
    Hostiadi, Dandy Pramana
    Ijtihadie, Royyana Muslim
    IEEE ACCESS, 2025, 13 : 31183 - 31204
  • [8] Flow-based Identification of Botnet Traffic by Mining Multiple Log Files
    Masud, Mohammad M.
    Al-Khateeb, Tahseen
    Khan, Latifur
    Thuraisingham, Bhavani
    Hamlen, Kevin W.
    DFMA 2008: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS & APPLICATIONS, PROCEEDINGS, 2008, : 200 - 206
  • [9] A self-learning stream classifier for flow-based botnet detection
    Gelian, Mahsa Nazemi
    Mashayekhi, Hoda
    Mashayekhi, Yoosof
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (16)
  • [10] Flow Based Botnet Traffic Detection Using Machine Learning
    Gahelot, Parul
    Dayal, Neelam
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 418 - 426