Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic

被引:10
|
作者
Shang, Yaoyao [1 ,2 ]
Yang, Shuangmao [2 ]
Wang, Wei [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, 3 Shangyuancun, Beijing 100044, Peoples R China
[2] Sci & Technol Elect Informat Control Lab, Chengdu 610036, Sichuan, Peoples R China
来源
关键词
Botnet detection; Network traffic; Network security; AUDIT DATA STREAMS; BEHAVIOR; APPS;
D O I
10.1007/978-3-030-00009-7_55
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Botnets have become one of the most serious threats to cyber infrastructure. Many existing botnet detection approaches become invalid due to botnet structure sophistication or encryption of payload of the traffic. In this work, we propose an effective anomaly-based botnet detection method by hybrid analysis of flow based and graph-based features of network traffic. Frist, from network traffic we extract 15 statistical aggregated flow based features as well as 7 types of graph based features, such as in degree, out degree, in degree weight, out degree weight, node betweenness centrality, local clustering coefficient and PageRank. Second, we employ K-means, k-NN and One-class SVM to detect bots based on the hybrid analysis of these two types of features. Finally, we collect a large size of network traffic in real computing environment by implementing 5 different botnets including newly propagated Mirai and others like Athena and Black energy. The extensive experimental results show that our method based on the hybrid analysis is better than the method of individual analysis in terms of detection accuracy. It achieves the best performance with 96.62% of F-score. The experimental results also demonstrate the effectiveness of our method on the detection of novel botnets like Mirai, Athena and Black energy.
引用
收藏
页码:612 / 621
页数:10
相关论文
共 50 条
  • [21] A Comparison of Clustering Algorithms for Botnet Detection Based on Network Flow
    Mai, Long
    Park, Minho
    2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 667 - 669
  • [22] A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems
    Duan, Li
    Zhou, Jingxian
    Wu, You
    Xu, Wenyao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (03)
  • [23] Botnet Detection Based on Multilateral Attribute Graph
    Cheng, Hua
    Shen, Yinda
    Cheng, Tao
    Fang, Yiquan
    Ling, Jianfan
    SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 66 - 76
  • [24] Method for botnet detection with small labelled samples based on graph neural network
    Zhu, Junjing
    Lin, Honggang
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2025, 26 (1-2)
  • [25] A review on graph-based approaches for network security monitoring and botnet detection
    Sofiane Lagraa
    Martin Husák
    Hamida Seba
    Satyanarayana Vuppala
    Radu State
    Moussa Ouedraogo
    International Journal of Information Security, 2024, 23 : 119 - 140
  • [26] A review on graph-based approaches for network security monitoring and botnet detection
    Lagraa, Sofiane
    Husak, Martin
    Seba, Hamida
    Vuppala, Satyanarayana
    State, Radu
    Ouedraogo, Moussa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 119 - 140
  • [27] Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis
    Alenazi, Abdelraman
    Traore, Issa
    Ganame, Karim
    Woungang, Isaac
    INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 1 - 18
  • [28] Anomaly detection analysis based on correlation of features in graph neural network
    Ko, Hoon
    Praca, Isabel
    Choi, Seong Gon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 25487 - 25501
  • [29] Anomaly detection analysis based on correlation of features in graph neural network
    Hoon Ko
    Isabel Praca
    Seong Gon Choi
    Multimedia Tools and Applications, 2024, 83 : 25487 - 25501
  • [30] Botnet detection based on network behavior
    Strayer, W. Timothy
    Lapsely, David
    Walsh, Robert
    Livadas, Carl
    BOTNET DETECTION: COUNTERING THE LARGEST SECURITY THREAT, 2008, 36 : 1 - +