Periodic Behavior in Botnet Command and Control Channels Traffic

被引:0
|
作者
AsSadhan, Basil [1 ]
Moura, Jose M. F. [1 ]
Lapsley, David [2 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, 5000 Forbes Ave, Pittsburgh, PA 15213 USA
[2] BBN Technol, Cambridge, MA USA
关键词
Botnet detection; period; duty cycle; SNR; periodogram; Walker large sample test;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A botnet is a large network of bots that are under the control of a bot herder. Botnets have become a significant threat to network communications and applications. Botnets' execution relies on Command and Control (C2) communication channels traffic, which occur prior to the attack activity itself. Therefore, the detection of C2 communication channels traffic enables the detection of the members of a botnet before any target is attacked. We study the periodic behavior of C2 traffic that is caused by the pre-programmed behavior of bots to check for and download updates every T seconds. We use this periodic behavior of the C2 traffic to detect bots. This involves evaluating the periodogram of traffic in the monitored network. Then applying Walker's large sample test to the maximum ordinate of the periodogram to determine if it is due to a high periodic component in the traffic or not, and, if it is, then it is bot traffic. We apply the test to a TinyP2P botnet generated by SLINGbot and show a strong periodic behavior in the bots traffic. We study the effect of the period's length and duty cycle of the C2 traffic on the test performance and find that it increases with the increase of the duty cycle and/or the decrease of the period length. We analyze the test's performance in the presence of injected random noise traffic and develop a lower and an upper bounds for the test performance.
引用
收藏
页码:2157 / 2162
页数:6
相关论文
共 50 条
  • [1] CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
    Dietrich, Christian J.
    Rossow, Christian
    Pohlmann, Norbert
    COMPUTER NETWORKS, 2013, 57 (02) : 475 - 486
  • [2] An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
    AsSadhan, Basil
    Moura, Jose M. F.
    JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 435 - 448
  • [3] Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations
    Burghouwt, Pieter
    Spruit, Marcel
    Sips, Henk
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 174 - 182
  • [4] Active Botnet Probing to Identify Obscure Command and Control Channels
    Gu, Guofei
    Yegneswaran, Vinod
    Porras, Phillip
    Stoll, Jennifer
    Lee, Wenke
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 241 - +
  • [5] Fluxing botnet command and control channels with URL shortening services
    Lee, Sangho
    Kim, Jong
    COMPUTER COMMUNICATIONS, 2013, 36 (03) : 320 - 332
  • [6] BotDet: A System for Real Time Botnet Command and Control Traffic Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Baker, Thar
    Jabbar, Sohail
    Khalid, Shehzad
    Jaf, Sardar
    IEEE ACCESS, 2018, 6 : 38947 - 38958
  • [7] Botnet command and control techniques
    Heron, Simon
    Network Security, 2007, 2007 (04) : 13 - 16
  • [8] Botnet Command and Control Mechanisms
    Zeidanloo, Hossein Rouhani
    Manaf, Azizah Abdul
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 564 - 568
  • [9] C&C Tracer: Botnet Command and Control Behavior Tracing
    Tsai, Meng-Han
    Chang, Kai-Chi
    Lin, Chang-Cheng
    Mao, Ching-Hao
    Lee, Huey-Ming
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 1859 - 1864
  • [10] Whispering Botnet Command and Control Instructions
    Baden, Mathis
    Torres, Christof Ferreira
    Pontiveros, Beltran Borja Fiz
    State, Radu
    2019 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT 2019), 2019, : 77 - 81