A Combined Fusion and Data Mining Framework for the Detection of Botnets

被引:1
|
作者
Kiayias, Aggelos [1 ]
Neumann, Justin [1 ]
Walluck, David [1 ]
McCusker, Owen [2 ]
机构
[1] Univ Connecticut, Dept Comp Sci & Engn, Storrs, CT 06269 USA
[2] Sonalysts Inc, Waterbury, CT 06385 USA
关键词
botnets; crimeware; distributed threat; data fusion; data mining; distributed detection model; profile; hyperplane; network behavior analyzer; threat-centricity; SYSTEM;
D O I
10.1109/CATCH.2009.9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes a combined fusion and mining framework applied to the detection of stealthy botnets. The framework leverages a fusion engine that tracks hosts through the use of feature-based profiles generated front multiple network sensor types. These profiles are classified and correlated based oil a set of known host profiles, e.g., web servers, mail servers, and hot behavioral characteristics. A mining engine discovers emergent threat profiles and delivers them to the fusion engine for processing. We describe the distributed nature of botnets and how they are created and managed. We then describe a combined fusion and mining model that builds orgy recent work in the cyber security domain. Pie framework tie present employs an adaptive fusion system driven by a mining system focused oil the discovery of new threats. We conclude with a discussion of experimental results, deployment issues, anal a summary of our arguments.
引用
收藏
页码:273 / +
页数:3
相关论文
共 50 条
  • [21] Mining Botnets and Their Evolution Patterns
    Choi, Jaehoon
    Kang, Jaewoo
    Lee, Jinseung
    Song, Chihwan
    Jin, Qingsong
    Lee, Sunwon
    Uh, Jinsun
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (04) : 605 - 615
  • [22] Framework of intrusion detection based on distributed data mining approach
    Lu, Yong
    Cao, Yang
    Ling, Jun
    Li, Li
    Wuhan Daxue Xuebao (Lixue Ban)/Journal of Wuhan University (Natural Science Edition), 2002, 48 (01):
  • [24] Decision theoretic fusion framework for actionability using data mining on an embedded system
    Lee, H
    Kang, S
    Ko, H
    DATA MINING: THEORY, METHODOLOGY, TECHNIQUES, AND APPLICATIONS, 2006, 3755 : 90 - 104
  • [25] TMDFM: A Data Fusion Model for Combined Detection of Tumor Markers
    Yuan, Chi
    Wang, Yongli
    Li, Yanchao
    Jiang, Xiaohui
    Masood, Isma
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE, 2015, : 657 - 660
  • [26] Prevention and Detection of Financial Statement Fraud - An Implementation of Data Mining Framework
    Gupta, Rajan
    Gill, Nasib Singh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (08) : 150 - 156
  • [27] Phishing Website Detection Framework Through Web Scraping and Data Mining
    Park, Andrew J.
    Quadari, Ruhi Naaz
    Tsang, Herbert H.
    2017 8TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2017, : 680 - 684
  • [28] Data Mining Framework for Random Access Failure Detection in LTE Networks
    Chernov, Sergey
    Chernogorov, Fedor
    Petrov, Dmitry
    Ristaniemi, Tapani
    2014 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATION (PIMRC), 2014, : 1321 - 1326
  • [29] Detection of Botnets Using Combined Host- and Network-Level Information
    Zeng, Yuanyuan
    Hu, Xin
    Shin, Kang G.
    2010 IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS DSN, 2010, : 291 - 300
  • [30] On the detection and identification of botnets
    Seewald, Alexander K.
    Gansterer, Wilfried N.
    COMPUTERS & SECURITY, 2010, 29 (01) : 45 - 58