Flow-based Identification of Botnet Traffic by Mining Multiple Log Files

被引:0
|
作者
Masud, Mohammad M. [1 ]
Al-Khateeb, Tahseen [1 ]
Khan, Latifur [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin W. [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75080 USA
关键词
Malware; botnet; intrusion detection; data mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected hosts (bots) to control the bots. If this traffic van be detected. both the C&C center and the bots it controls can be detected and the botnet can be. disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that hots respond much faster Than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect hot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.
引用
收藏
页码:200 / 206
页数:7
相关论文
共 50 条
  • [21] Entropy and flow-based approach for anomalous traffic filtering
    Zempoaltecatl-Piedras, Rafael
    Velarde-Alvarado, Pablo
    Torres-Roman, Deni
    3RD IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, CIIECC 2013, 2013, 7 : 360 - 369
  • [22] Anomaly Characterization in Flow-Based Traffic Time Series
    Sperotto, Anna
    Sadre, Ramin
    Pras, Aiko
    IP OPERATIONS AND MANAGEMENT, PROCEEDINGS, 2008, 5275 : 15 - 27
  • [23] A Flow-based Traffic Model for SIP Messages in IMS
    Xiao, Jie
    Huang, Changcheng
    Yan, James
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2665 - 2671
  • [24] Survey of approaches and features for the identification of HTTP-based botnet traffic
    Acarali, Dilara
    Rajarajan, Muttukrishnan
    Komninos, Nikos
    Herwono, Ian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 76 : 1 - 15
  • [25] Dynamic traffic prediction based on traffic flow mining
    Wang, Yaqin
    Chen, Yue
    Qin, Minggui
    Zhu, Yangyong
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 6078 - +
  • [26] Survey on Traffic Flow-based Autonomous Driving Simulation Tests
    Tan, Yongquan
    Yang, Yukuan
    Ren, Hongpin
    Yang, Zhuokun
    Dong, Qian
    Xue, Yunzhi
    2023 IEEE 32ND ASIAN TEST SYMPOSIUM, ATS, 2023, : 100 - 105
  • [27] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399
  • [28] Traffic Flow-Based Crowdsourced Mapping in Complex Urban Scenario
    Qin, Tong
    Huang, Haihui
    Wang, Ziqiang
    Chen, Tongqing
    Ding, Wenchao
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2023, 8 (08) : 5077 - 5083
  • [29] Detection of slow port scans in flow-based network traffic
    Ring, Markus
    Landes, Dieter
    Hotho, Andreas
    PLOS ONE, 2018, 13 (09):
  • [30] Identifying Operating System Using Flow-Based Traffic Fingerprinting
    Jirsik, Tomas
    Celeda, Pavel
    ADVANCES IN COMMUNICATION NETWORKING, 2014, 8846 : 70 - 73