Periodic Behavior in Botnet Command and Control Channels Traffic

被引:0
|
作者
AsSadhan, Basil [1 ]
Moura, Jose M. F. [1 ]
Lapsley, David [2 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, 5000 Forbes Ave, Pittsburgh, PA 15213 USA
[2] BBN Technol, Cambridge, MA USA
关键词
Botnet detection; period; duty cycle; SNR; periodogram; Walker large sample test;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A botnet is a large network of bots that are under the control of a bot herder. Botnets have become a significant threat to network communications and applications. Botnets' execution relies on Command and Control (C2) communication channels traffic, which occur prior to the attack activity itself. Therefore, the detection of C2 communication channels traffic enables the detection of the members of a botnet before any target is attacked. We study the periodic behavior of C2 traffic that is caused by the pre-programmed behavior of bots to check for and download updates every T seconds. We use this periodic behavior of the C2 traffic to detect bots. This involves evaluating the periodogram of traffic in the monitored network. Then applying Walker's large sample test to the maximum ordinate of the periodogram to determine if it is due to a high periodic component in the traffic or not, and, if it is, then it is bot traffic. We apply the test to a TinyP2P botnet generated by SLINGbot and show a strong periodic behavior in the bots traffic. We study the effect of the period's length and duty cycle of the C2 traffic on the test performance and find that it increases with the increase of the duty cycle and/or the decrease of the period length. We analyze the test's performance in the presence of injected random noise traffic and develop a lower and an upper bounds for the test performance.
引用
收藏
页码:2157 / 2162
页数:6
相关论文
共 50 条
  • [21] Getting Prepared for the Next Botnet Attack Detecting Algorithmically Generated Domains in Botnet Command and Control
    Kelley, Tim
    Furey, Eoghan
    2018 29TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2018,
  • [22] Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
    Franzoni, Federico
    Abellan, Ivan
    Daza, Vanesa
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12059 : 3 - 19
  • [23] Botract: abusing smart contracts and blockchain for botnet command and control
    Alibrahim, Omar
    Malaika, Majid
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 147 - 163
  • [24] Inference and Analysis of Formal Models of Botnet Command and Control Protocols
    Cho, Chia Yuan
    Babic, Domagoj
    Shin, Eui Chul Richard
    Song, Dawn
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 426 - 439
  • [25] Using Behavioral Similarity for Botnet Command-and-Control Discovery
    Jusko, Jan
    Rehak, Martin
    Stiborek, Jan
    Kohout, Jan
    Pevny, Tomas
    IEEE INTELLIGENT SYSTEMS, 2016, 31 (05) : 16 - 23
  • [26] A Malware Beacon of Botnet by Local Periodic Communication Behavior
    Yeh, Yi-Ren
    Tu, Tang Chen
    Sun, Ming-Kung
    Pi, Shih Ming
    Huang, C-Y
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 653 - 657
  • [27] A framework for detecting botnet command and control communication over an encrypted channel
    Ismail Z.
    Jantan A.
    Yusoff M.N.
    International Journal of Advanced Computer Science and Applications, 2020, 11 (01): : 319 - 326
  • [28] Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing
    Anagnostopoulos, Marios
    Kambourakis, Georgios
    Drakatos, Panagiotis
    Karavolos, Michail
    Kotsilitis, Sarantis
    Yau, David K. Y.
    WEB INFORMATION SYSTEMS ENGINEERING, WISE 2017, PT II, 2017, 10570 : 517 - 527
  • [29] Real-Time Botnet Command and Control Characterization at the Host Level
    Etemad, Farhood Farid
    Vahdani, Payam
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1005 - 1009
  • [30] Botnet Defense System: Observability, Controllability, and Basic Command and Control Strategy
    Yamaguchi, Shingo
    SENSORS, 2022, 22 (23)