Detection of Botnets Using Combined Host- and Network-Level Information

被引:28
|
作者
Zeng, Yuanyuan [1 ]
Hu, Xin [1 ]
Shin, Kang G. [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
10.1109/DSN.2010.5544306
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bots are coordinated by a command and control (C&C) infrastructure to launch attacks that seriously threaten the Internet services and users. Most botnet-detection approaches function at the network level and require the analysis of packets' payloads, raising privacy concerns and incurring large computational overheads. Moreover, network traffic analysis alone can seldom provide a complete picture of botnets' behavior. By contrast, in-host detection approaches are useful to identify each bot's host-wide behavior, but are susceptible to the host-resident malware if used alone. To address these limitations, we consider both the coordination within a botnet and the malicious behavior each bot exhibits at the host level, and propose a C&C protocol-independent detection framework that combines host-and network-level information for making detection decisions. T he framework is shown to be effective in detecting various types of botnets with low false-alarm rates.
引用
收藏
页码:291 / 300
页数:10
相关论文
共 50 条
  • [1] P2P Botnet Detection: Combined Host- and Network-Level Analysis
    Muthumanickam, K.
    Ilavarasan, E.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [2] An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
    Liu, Jiannan
    Xiao, Kun
    Luo, Lei
    Li, Yun
    Chen, Lirong
    2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 122 - 129
  • [3] Network-level polymorphic shellcode detection using emulation
    Polychronakis, Michalis
    Anagnostakis, Kostas G.
    Markatos, Evangelos P.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 2 (04): : 257 - 274
  • [4] Network-level polymorphic shellcode detection using emulation
    Polychronakis, Michalis
    Anagnostakis, Kostas G.
    Markatos, Evangelos P.
    DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 54 - 73
  • [5] Deep Learning in Network-Level Performance Prediction Using Cross-Layer Information
    Cao, Qi
    Pun, Man-On
    Chen, Yi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (04): : 2364 - 2377
  • [6] Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network
    Lysenko, Sergii
    Savenko, Oleg
    Bobrovnikova, Kira
    Kryshchuk, Andrii
    Savenko, Bohdan
    COMPUTER NETWORKS (CN 2017), 2017, 718 : 166 - 181
  • [7] Managing Scope Changes for Cellular Network-level Anomaly Detection
    Ciocarlie, Gabriela F.
    Cheng, Chih-Chieh
    Connolly, Christopher
    Lindqvist, Ulf
    Novaczki, Szabolcs
    Sanneck, Henning
    Naseer-ul-Islam, Muhammad
    2014 11TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS (ISWCS), 2014, : 375 - 379
  • [8] Implementation of automated network-level crack detection processes in Maryland
    Groeger, JL
    Stephanos, P
    Dorsey, P
    Chapman, M
    PAVEMENT ASSESSMENT, MONITORING, AND EVALUATION 2003: PAVEMENT DESIGN, MANAGEMENT, AND PERFORMANCE, 2003, (1860): : 109 - 116
  • [9] Using network-level support to improve cache routing
    Legedza, U
    Guttag, J
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (22-23): : 2193 - 2201
  • [10] Spam Email Filtering Using Network-Level Properties
    Cortez, Paulo
    Correia, Andre
    Sousa, Pedro
    Rocha, Miguel
    Rio, Miguel
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2010, 6171 : 476 - +