BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors

被引:150
作者
Wang, Wei [1 ,2 ]
Shang, Yaoyao [1 ,2 ]
He, Yongzhong [1 ,2 ]
Li, Yidong [1 ,2 ]
Liu, Jiqiang [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, 3 Shangyuancun, Beijing 100044, Peoples R China
[2] Beijing Jiaotong Univ, Sch Comp & Informat Technol, 3 Shangyuancun, Beijing 100044, Peoples R China
关键词
Botnet detection; Network security; Intrusion detection; Network monitoring; Machine learning; AUDIT DATA STREAMS; INTRUSION; ANOMALIES; FEATURES;
D O I
10.1016/j.ins.2019.09.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Botnets have become one of the most serious threats to cyber infrastructure. Most existing work on detecting botnets is based on flow-based traffic analysis by mining their communication patterns. There also exists related work based on anomaly detection in communication graphs. As bots have continuously evolved and become increasingly sophisticated, only using flow-based traffic analysis or graph-based analysis for the detection would result in false negatives or false positives, or can even be evaded. In this work, we propose BotMark, an automated model that detects botnets with hybrid analysis of flow-based and graph-based network traffic behaviors. We extract 15 statistical flow-based traffic features as well as 3 graph-based features in building the detection model. For flow-based detection, we consider the similarity and stability of C-flow as measurements in the detection. In particular, we employ k-means to measure the similarity of C-flows and assign similarity scores, and calculate stability score of C-flows through the distribution of packet length within a C-flow. The graph-based detection is based on the observation that the neighborhoods of anomalous nodes significantly differ from those of normal nodes in communication graphs. In particular, we use least-square technique and Local Outlier Factor (LOF) to calculate anomaly scores that measure the differences of their neighborhoods. Our models use the scores to mark bots. BotMark performs automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors by ensemble of the detection results based on similarity scores, stability scores and anomaly scores. We collect a very large size of network traffic by simulating 5 newly propagated botnets, including Mirai, Black energy, Zeus, Athena and Ares in a real computing environment. Extensive experimental results demonstrate the effectiveness of BotMark. It achieves 99.94% in terms of detection accuracy, outperforming any individual detector with flow-based detection or graph-based detection. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:284 / 296
页数:13
相关论文
共 41 条
[1]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[2]  
Akoglu L, 2010, LECT NOTES ARTIF INT, V6119, P410
[3]  
[Anonymous], 2012, P 8 INT C EM NETW EX
[4]  
[Anonymous], 2008, BOTMINER CLUSTERING
[5]  
[Anonymous], 19 USENIX SEC S WASH
[6]  
Beigi EB, 2014, IEEE CONF COMM NETW, P247, DOI 10.1109/CNS.2014.6997492
[7]   Fast unfolding of communities in large networks [J].
Blondel, Vincent D. ;
Guillaume, Jean-Loup ;
Lambiotte, Renaud ;
Lefebvre, Etienne .
JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2008,
[8]   Botnet detection by monitoring group activities in DNS traffic [J].
Choi, Hyunsang ;
Lee, Hanwoo ;
Lee, Heejo ;
Kim, Hyogon .
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, :715-720
[9]   Botnet detection using graph-based feature clustering [J].
Chowdhury S. ;
Khanzadeh M. ;
Akula R. ;
Zhang F. ;
Zhang S. ;
Medal H. ;
Marufuzzaman M. ;
Bian L. .
Journal of Big Data, 2017, 4 (01)
[10]   BotTrack: Tracking Botnets Using NetFlow and PageRank [J].
Francois, Jerome ;
Wang, Shaonan ;
State, Radu ;
Engel, Thomas .
NETWORKING 2011, PT I, 2011, 6640 :1-14