Detecting botnet by anomalous traffic

被引:21
|
作者
Chen, Chia-Mei [1 ]
Lin, Hsiao-Chung [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Informat Management, Kaohsiung 804, Taiwan
关键词
Botnet detection; Intrusion detection; IRC;
D O I
10.1016/j.jisa.2014.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets can cause significant security threat and huge loss to organizations, and are difficult to discover their existence. Therefore they have become one of the most severe threats on the Internet. The core component of botnets is their command and control channel. Botnets often use IRC (Internet Relay Chat) as a communication channel through which the botmaster can control the bots to launch attacks or propagate more infections. In this paper, anomaly score based botnet detection is proposed to identify the botnet activities by using the similarity measurement and the periodic characteristics of botnets. To improve the detection rate, the proposed system employs two-level correlation relating the set of hosts with same anomaly behaviors. The proposed method can differentiate the malicious network traffic generated by infected hosts (bots) from that by normal IRC clients, even in a network with only a very small number of bots. The experiment results show that, regardless the size of the botnet in a network, the proposed approach efficiently detects abnormal IRC traffic and identifies botnet activities. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [21] Sliding Time Analysis in Traffic Segmentation for Botnet Activity Detection
    Hostiadi, Dandy Pramana
    Ahmad, Tohari
    5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022), 2022, : 286 - 291
  • [22] Visualization of Invariant Bot Behavior for Effective Botnet Traffic Detection
    Shahrestani, Alireza
    Feily, Maryam
    Masood, Mona
    Muniandy, Balakrishnan
    2012 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATION TECHNOLOGIES (ISTT), 2012, : 325 - 330
  • [23] Botnet detection based on traffic behavior analysis and flow intervals
    Zhao, David
    Traore, Issa
    Sayed, Bassam
    Lu, Wei
    Saad, Sherif
    Ghorbani, Ali
    Garant, Dan
    COMPUTERS & SECURITY, 2013, 39 : 2 - 16
  • [24] A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks
    Ullah, Imtiaz
    Mahmoud, Qusay H.
    2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 134 - 140
  • [25] Fast-flux Botnet Detection from Network Traffic
    Paul, Tuhin
    Tyagi, Rohit
    Manoj, B. S.
    Thanudas, B.
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [26] Utilizing Features of Aggregated Flows to Identify Botnet Network Traffic
    Heydari, Banafsheh
    Yajam, Habib
    Akhaee, Mohammad Ali
    Salehkalaibar, Sadaf
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 25 - 30
  • [27] Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
    Injadat, MohammadNoor
    Moubayed, Abdallah
    Shami, Abdallah
    2020 32ND INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2020, : 170 - 173
  • [28] DETECTING BOTNET VICTIMS THROUGH GRAPH-BASED MACHINE LEARNING
    Millar, Kyle
    Simpson, Lachlan
    Cheng, Adriel
    Chew, Hong Gunn
    Lim, Cheng-Chew
    PROCEEDINGS OF 2021 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), 2021, : 46 - 51
  • [29] Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis
    Alenazi, Abdelraman
    Traore, Issa
    Ganame, Karim
    Woungang, Isaac
    INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 1 - 18
  • [30] Mirai Botnet Attack Detection in Low-Scale Network Traffic
    Guven, Ebu Yusuf
    Gurkas-Aydin, Zeynep
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (01) : 419 - 437