Flow-based Identification of Botnet Traffic by Mining Multiple Log Files

被引:0
|
作者
Masud, Mohammad M. [1 ]
Al-Khateeb, Tahseen [1 ]
Khan, Latifur [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin W. [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75080 USA
关键词
Malware; botnet; intrusion detection; data mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected hosts (bots) to control the bots. If this traffic van be detected. both the C&C center and the bots it controls can be detected and the botnet can be. disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that hots respond much faster Than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect hot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.
引用
收藏
页码:200 / 206
页数:7
相关论文
共 50 条
  • [1] Flow-Based Consensus Partitions for Botnet Detection
    Mai, Long
    Kim, YoungPin
    Choi, DongHo
    Nguyen Khac Bao
    Phan, Trung V.
    Park, Minho
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 1253 - 1255
  • [2] Botnet detection via mining of traffic flow characteristics
    Kirubavathi, G.
    Anitha, R.
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 50 : 91 - 101
  • [3] BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
    Wang, Wei
    Shang, Yaoyao
    He, Yongzhong
    Li, Yidong
    Liu, Jiqiang
    INFORMATION SCIENCES, 2020, 511 : 284 - 296
  • [4] Botnet Identification Based on Flow Traffic by Using K-Nearest Neighbor
    Gunawan, Dani
    Hairani, Tika
    Hizriadi, Ainul
    2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS 2019), 2019, : 95 - 99
  • [5] Machine learning based Botnet Identification Traffic
    Azab, Ahmad
    Alazab, Mamoun
    Aiash, Mahdi
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1788 - 1794
  • [6] An efficient flow-based botnet detection using supervised machine learning
    Stevanovic, Matija
    Pedersen, Jens Myrup
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 797 - 801
  • [7] Generalization Performance Analysis of Flow-based Peer-to-Peer Traffic Identification
    Wang, Yi-Hsien
    Gau, Victor
    Bosaw, Trevor
    Hwang, Jenq-Neng
    Lippman, Alan
    Lieberman, Dan
    Wu, I-Chen
    2008 IEEE WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING, 2008, : 267 - +
  • [8] A self-learning stream classifier for flow-based botnet detection
    Gelian, Mahsa Nazemi
    Mashayekhi, Hoda
    Mashayekhi, Yoosof
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (16)
  • [9] ARCHITECTURE FOR APPLYING DATA MINING AND VISUALIZATION ON NETWORK FLOW FOR BOTNET TRAFFIC DETECTION
    Shahrestani, Alireza
    Feily, Maryam
    Ahmad, Rodina
    Ramadass, Sureswaran
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 1, 2009, : 33 - +
  • [10] A flow-based model for Internet backbone traffic
    Barakat, C
    Thiran, P
    Iannaccone, G
    Diot, C
    Owezarski, P
    IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, 2002, : 35 - 47