Flow-based Identification of Botnet Traffic by Mining Multiple Log Files

被引:0
|
作者
Masud, Mohammad M. [1 ]
Al-Khateeb, Tahseen [1 ]
Khan, Latifur [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin W. [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75080 USA
关键词
Malware; botnet; intrusion detection; data mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected hosts (bots) to control the bots. If this traffic van be detected. both the C&C center and the bots it controls can be detected and the botnet can be. disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that hots respond much faster Than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect hot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.
引用
收藏
页码:200 / 206
页数:7
相关论文
共 50 条
  • [41] A Fast Systolic Priority Queue Architecture for a Flow-Based Traffic Manager
    Benacer, Imad
    Boyer, Francois-Raymond
    Belanger, Normand
    Savaria, Yvon
    2016 14TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2016,
  • [42] Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks
    Huoh, Ting-Li
    Luo, Yan
    Li, Peilong
    Zhang, Tong
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1224 - 1237
  • [43] Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection
    Rodriguez, Maria
    Alesanco, Alvaro
    Mehavilla, Lorena
    Garcia, Jose
    SENSORS, 2022, 22 (23)
  • [44] Flow-Based Model of Multipath Routing with Traffic Policing Rejection Balancing
    Abdulwahd, Mohanad Najm
    2015 SECOND INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T 2015), 2015, : 73 - 75
  • [45] A Flow-Based Centralized Route Guidance System for Traffic Congestion Mitigation
    Matsui, Yusuke
    Yoshihiro, Takuya
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (08) : 8681 - 8694
  • [46] Flow-based network traffic generation using Generative Adversarial Networks
    Ring, Markus
    Schloer, Daniel
    Landes, Dieter
    Hotho, Andreas
    COMPUTERS & SECURITY, 2019, 82 : 156 - 172
  • [47] Learning to Classify: A Flow-Based Relation Network for Encrypted Traffic Classification
    Zheng, Wenbo
    Gou, Chao
    Yan, Lan
    Mo, Shaocong
    WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020), 2020, : 13 - 22
  • [48] Energy-Aware Multiperiod Traffic Engineering with Flow-based Routing
    Addis, Bernardetta
    Capone, Antonio
    Carello, Giuliana
    Gianoli, Luca Giovanni
    Sanso, Brunilde
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012, : 5957 - 5961
  • [49] A Survey on Predicting User Behavior Based on Web Server Log Files in a Web Usage Mining
    Anitha, V.
    Devi, P. Isakki
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [50] Flow Identification and Characteristics Mining from Internet Traffic with Hadoop
    Cai, Yuanjun
    Wu, Bin
    Zhang, Xinwei
    Luo, Min
    Su, Jinzhao
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2014,