BotDet: A System for Real Time Botnet Command and Control Traffic Detection

被引:33
|
作者
Ghafir, Ibrahim [1 ,2 ]
Prenosil, Vaclav [1 ]
Hammoudeh, Mohammad [3 ]
Baker, Thar [4 ]
Jabbar, Sohail [5 ]
Khalid, Shehzad [6 ]
Jaf, Sardar [2 ]
机构
[1] Masaryk Univ, Fac Informat, Brno 60200, Czech Republic
[2] Univ Durham, Dept Comp Sci, Durham DH1 3LE, England
[3] Manchester Metropolitan Univ, Fac Sci & Engn, Manchester M1 5GD, Lancs, England
[4] Liverpool John Moores Univ, Dept Comp Sci, Liverpool L3 5UA, Merseyside, England
[5] Natl Text Univ, Dept Comp Sci, Faisalabad 37610, Pakistan
[6] Bahria Univ, Dept Comp Engn, Islamabad 44220, Pakistan
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Critical infrastructure security; healthcare cyber attacks; malware; botnet; command and control server; intrusion detection system; alert correlation; CLOUD;
D O I
10.1109/ACCESS.2018.2846740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past decade, the digitization of services transformed the healthcare sector leading to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled with high value of patient records attracted the attention of hackers. Sophisticated advanced persistent threats and malware have significantly contributed to increasing risks to the health sector. Many recent attacks are attributed to the spread of malicious software, e.g., ransomware or bot malware. Machines infected with bot malware can be used as tools for remote attack or even cryptomining. This paper presents a novel approach, called BotDet, for botnet Command and Control (C&C) traffic detection to defend against malware attacks in critical ultrastructure systems. There are two stages in the development of the proposed system: 1) we have developed four detection modules to detect different possible techniques used in botnet C&C communications and 2) we have designed a correlation framework to reduce the rate of false alarms raised by individual detection modules. Evaluation results show that BotDet balances the true positive rate and the false positive rate with 82.3% and 13.6%, respectively. Furthermore, it proves BotDet capability of real time detection.
引用
收藏
页码:38947 / 38958
页数:12
相关论文
共 50 条
  • [21] A Framework for Detecting Botnet Command and Control Communication over an Encrypted Channel
    Ismail, Zahian
    Jantan, Aman
    Yusoff, Mohd Najwadi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 319 - 326
  • [22] Prototyping Distributed Botnet Detection System in Computer Networks
    Putra, Muhammad Aidiel Rachman
    Ahmad, Tohari
    Ijtihadie, Royyana Muslim
    Hostiadi, Dandy Pramana
    5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022), 2022, : 292 - 297
  • [23] Real-time Detection of Botnet Behavior in Cloud Using Domain Generation Algorithm
    Kumar, Vimal
    Kumar, Satish
    Gupta, Avadhesh Kumar
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [24] Peer to Peer Botnet Detection Based on Network Traffic Analysis
    Almutairi, Suzan
    Mahfoudh, Saoucene
    Alowibdi, Jalal S.
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [25] Botnet detection based on traffic behavior analysis and flow intervals
    Zhao, David
    Traore, Issa
    Sayed, Bassam
    Lu, Wei
    Saad, Sherif
    Ghorbani, Ali
    Garant, Dan
    COMPUTERS & SECURITY, 2013, 39 : 2 - 16
  • [26] Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic
    Harsha, T.
    Asha, S.
    Soniya, B.
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 471 - 478
  • [27] Using Botnet Structure to Construct the Communication System of a Real-time Monitoring Platform
    Hsiao, Han-Wei
    Tung, Shih-Heng
    Shih, Ming-Hsiang
    Sung, Wen-Pei
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017, : 2860 - 2865
  • [28] A Technique for the Botnet Detection Based on DNS-Traffic Analysis
    Pomorova, Oksana
    Savenko, Oleg
    Lysenko, Sergii
    Kryshchuk, Andrii
    Bobrovnikova, Kira
    COMPUTER NETWORKS, CN 2015, 2015, 522 : 127 - 138
  • [29] Fast-flux Botnet Detection from Network Traffic
    Paul, Tuhin
    Tyagi, Rohit
    Manoj, B. S.
    Thanudas, B.
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [30] Flow Based Botnet Traffic Detection Using Machine Learning
    Gahelot, Parul
    Dayal, Neelam
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 418 - 426