BotDet: A System for Real Time Botnet Command and Control Traffic Detection

被引:36
作者
Ghafir, Ibrahim [1 ,2 ]
Prenosil, Vaclav [1 ]
Hammoudeh, Mohammad [3 ]
Baker, Thar [4 ]
Jabbar, Sohail [5 ]
Khalid, Shehzad [6 ]
Jaf, Sardar [2 ]
机构
[1] Masaryk Univ, Fac Informat, Brno 60200, Czech Republic
[2] Univ Durham, Dept Comp Sci, Durham DH1 3LE, England
[3] Manchester Metropolitan Univ, Fac Sci & Engn, Manchester M1 5GD, Lancs, England
[4] Liverpool John Moores Univ, Dept Comp Sci, Liverpool L3 5UA, Merseyside, England
[5] Natl Text Univ, Dept Comp Sci, Faisalabad 37610, Pakistan
[6] Bahria Univ, Dept Comp Engn, Islamabad 44220, Pakistan
关键词
Critical infrastructure security; healthcare cyber attacks; malware; botnet; command and control server; intrusion detection system; alert correlation; CLOUD;
D O I
10.1109/ACCESS.2018.2846740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past decade, the digitization of services transformed the healthcare sector leading to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled with high value of patient records attracted the attention of hackers. Sophisticated advanced persistent threats and malware have significantly contributed to increasing risks to the health sector. Many recent attacks are attributed to the spread of malicious software, e.g., ransomware or bot malware. Machines infected with bot malware can be used as tools for remote attack or even cryptomining. This paper presents a novel approach, called BotDet, for botnet Command and Control (C&C) traffic detection to defend against malware attacks in critical ultrastructure systems. There are two stages in the development of the proposed system: 1) we have developed four detection modules to detect different possible techniques used in botnet C&C communications and 2) we have designed a correlation framework to reduce the rate of false alarms raised by individual detection modules. Evaluation results show that BotDet balances the true positive rate and the false positive rate with 82.3% and 13.6%, respectively. Furthermore, it proves BotDet capability of real time detection.
引用
收藏
页码:38947 / 38958
页数:12
相关论文
共 44 条
[1]  
Agarwal P., 2014, INT J INNOV ADV COMP, V3
[2]  
Anagnostakis K. G., 2005, USENIX SECUR
[3]  
[Anonymous], BRO NETW SEC MON
[4]  
Arshad S., 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE 2011), P564, DOI 10.1109/ICCAIE.2011.6162198
[5]   Detecting Botnets using Command and Control Traffic [J].
AsSadhan, Basil ;
Moura, Jose M. F. ;
Lapsley, David ;
Jones, Christine ;
Strayer, W. Timothy .
2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, :156-+
[6]  
Bacher P., 2005, TECH REP
[7]  
Balram Soniya, 2014, International Journal of Network Security, V16, P46
[8]  
Behal S., 2010, SIGNATURE BASED BOT
[9]   PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Laurent, Maryline ;
Jemai, Abderrazak ;
Attia, Rabah .
COMPUTER NETWORKS, 2018, 133 :141-156
[10]   PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Jemai, Abderrazak ;
Laurent, Maryline ;
Attia, Rabah .
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, :133-146