Detecting botnet by anomalous traffic

被引:21
|
作者
Chen, Chia-Mei [1 ]
Lin, Hsiao-Chung [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Informat Management, Kaohsiung 804, Taiwan
关键词
Botnet detection; Intrusion detection; IRC;
D O I
10.1016/j.jisa.2014.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets can cause significant security threat and huge loss to organizations, and are difficult to discover their existence. Therefore they have become one of the most severe threats on the Internet. The core component of botnets is their command and control channel. Botnets often use IRC (Internet Relay Chat) as a communication channel through which the botmaster can control the bots to launch attacks or propagate more infections. In this paper, anomaly score based botnet detection is proposed to identify the botnet activities by using the similarity measurement and the periodic characteristics of botnets. To improve the detection rate, the proposed system employs two-level correlation relating the set of hosts with same anomaly behaviors. The proposed method can differentiate the malicious network traffic generated by infected hosts (bots) from that by normal IRC clients, even in a network with only a very small number of bots. The experiment results show that, regardless the size of the botnet in a network, the proposed approach efficiently detects abnormal IRC traffic and identifies botnet activities. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [1] Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
    Debashi, Mohamed
    Vickers, Paul
    IEEE ACCESS, 2018, 6 : 33826 - 33839
  • [2] Detecting DGA-Based Botnet with DNS Traffic Analysis in Monitored Network
    Dinh-Tu Truong
    Cheng, Guang
    Jakalan, Ahmad
    Guo, Xiaojun
    Zhou, Aiping
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 217 - 230
  • [3] Detecting anomalous network traffic with self-organizing maps
    Ramadas, M
    Ostermann, S
    Tjaden, B
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 36 - 54
  • [4] Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows
    Kocak, Fatih
    Miller, David J.
    Kesidis, George
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [5] An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone
    Zang, Xiao-Dong
    Gong, Jian
    Hu, Xiao-Yan
    IEEE ACCESS, 2019, 7 : 56920 - 56934
  • [6] Dimensional Feature Reduction for Detecting Botnet Activities
    Putra, Muhammad Aidiel Rachman
    Ahmad, Tohari
    Hostiadi, Dandy Pramana
    2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 43 - 48
  • [7] Structural Node Representation Learning for Detecting Botnet Nodes
    Carpenter, Justin
    Layne, Janet
    Serra, Edoardo
    Cuzzocrea, Alfredo
    Gallo, Carmine
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2023, PT I, 2023, 13956 : 731 - 743
  • [8] Detecting spoofing and anomalous traffic in wireless networks via forge-resistant relationships
    Li, Qing
    Trappe, Wade
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (04) : 793 - 808
  • [9] BotCVD: Visual analysis of DNS traffic for botnet detection
    Jiang, H. (hellojhl@163.com), 1600, Advanced Institute of Convergence Information Technology (04): : 264 - 273
  • [10] Botnet detection via mining of traffic flow characteristics
    Kirubavathi, G.
    Anitha, R.
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 50 : 91 - 101