Hybrid Botnet Detection Based on Host and Network Analysis

被引:23
|
作者
Almutairi, Suzan [1 ]
Mahfoudh, Saoucene [2 ]
Almutairi, Sultan [3 ]
Alowibdi, Jalal S. [4 ]
机构
[1] Tech & Vocat Corp, Riyadh, Saudi Arabia
[2] Dar Al Hekma Univ, Engn Comp & Informat, Jeddah, Saudi Arabia
[3] Technol Control Co, Riyadh, Saudi Arabia
[4] Univ Jeddah, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
关键词
COMMAND;
D O I
10.1155/2020/9024726
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. The size of the botnet is usually very large, and millions of infected hosts may belong to it. In this paper, we addressed the problem of botnet detection based on network's flows records and activities in the host. Thus, we propose a general technique capable of detecting new botnets in early phase. Our technique is implemented in both sides: host side and network side. The botnet communication traffic we are interested in includes HTTP, P2P, IRC, and DNS using IP fluxing. HANABot algorithm is proposed to preprocess and extract features to distinguish the botnet behavior from the legitimate behavior. We evaluate our solution using a collection of real datasets (malicious and legitimate). Our experiment shows a high level of accuracy and a low false positive rate. Furthermore, a comparison between some existing approaches was given, focusing on specific features and performance. The proposed technique outperforms some of the presented approaches in terms of accurately detecting botnet flow records within Netflow traces.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] A comprehensive node-based botnet detection framework for IoT network
    Aldaej, Abdulaziz
    Ahanger, Tariq Ahamed
    Atiquzzaman, Mohammed
    Ullah, Imdad
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 9261 - 9281
  • [32] DNNBoT: Deep Neural Network-Based Botnet Detection and Classification
    Haq, Mohd Anul
    Khan, Mohd Abdul Rahim
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (01): : 1729 - 1750
  • [33] Analysis on Botnet Detection Techniques
    Asha, S.
    Harsha, T.
    Soniya, B.
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [34] Ichnaea: Effective P2P Botnet Detection Approach Based on Analysis of Network Flows
    Khodadadi, Rahimeh
    Akbari, Behzad
    2014 7th International Symposium on Telecommunications (IST), 2014, : 934 - 940
  • [35] A Survey on Host-Based Botnet Identification
    Ilavarasan, E.
    Muthumanickam, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 166 - 170
  • [36] Botnet detection based on traffic behavior analysis and flow intervals
    Zhao, David
    Traore, Issa
    Sayed, Bassam
    Lu, Wei
    Saad, Sherif
    Ghorbani, Ali
    Garant, Dan
    COMPUTERS & SECURITY, 2013, 39 : 2 - 16
  • [37] A Review of Botnet Detection Approaches Based on DNS Traffic Analysis
    Al-Mashhadi, Saif
    Anbar, Mohammed
    Karuppayah, Shankar
    Al-Ani, Ahmed K.
    INTELLIGENT AND INTERACTIVE COMPUTING, 2019, 67 : 305 - 321
  • [38] DeDroid: A Mobile Botnet Detection Approach Based on Static Analysis
    Karim, Ahmad
    Salleh, Rosli
    Shah, Syed Adeel Ali
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1327 - 1332
  • [39] A Host-Based Approach to BotNet Investigation?
    Law, Frank Y. W.
    Chow, K. P.
    Lai, Pierre K. Y.
    Tse, Hayson K. S.
    DIGITAL FORENSICS AND CYBER CRIME, 2010, 31 : 161 - 170
  • [40] A Technique for the Botnet Detection Based on DNS-Traffic Analysis
    Pomorova, Oksana
    Savenko, Oleg
    Lysenko, Sergii
    Kryshchuk, Andrii
    Bobrovnikova, Kira
    COMPUTER NETWORKS, CN 2015, 2015, 522 : 127 - 138