BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors

被引:142
|
作者
Wang, Wei [1 ,2 ]
Shang, Yaoyao [1 ,2 ]
He, Yongzhong [1 ,2 ]
Li, Yidong [1 ,2 ]
Liu, Jiqiang [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, 3 Shangyuancun, Beijing 100044, Peoples R China
[2] Beijing Jiaotong Univ, Sch Comp & Informat Technol, 3 Shangyuancun, Beijing 100044, Peoples R China
关键词
Botnet detection; Network security; Intrusion detection; Network monitoring; Machine learning; AUDIT DATA STREAMS; INTRUSION; ANOMALIES; FEATURES;
D O I
10.1016/j.ins.2019.09.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Botnets have become one of the most serious threats to cyber infrastructure. Most existing work on detecting botnets is based on flow-based traffic analysis by mining their communication patterns. There also exists related work based on anomaly detection in communication graphs. As bots have continuously evolved and become increasingly sophisticated, only using flow-based traffic analysis or graph-based analysis for the detection would result in false negatives or false positives, or can even be evaded. In this work, we propose BotMark, an automated model that detects botnets with hybrid analysis of flow-based and graph-based network traffic behaviors. We extract 15 statistical flow-based traffic features as well as 3 graph-based features in building the detection model. For flow-based detection, we consider the similarity and stability of C-flow as measurements in the detection. In particular, we employ k-means to measure the similarity of C-flows and assign similarity scores, and calculate stability score of C-flows through the distribution of packet length within a C-flow. The graph-based detection is based on the observation that the neighborhoods of anomalous nodes significantly differ from those of normal nodes in communication graphs. In particular, we use least-square technique and Local Outlier Factor (LOF) to calculate anomaly scores that measure the differences of their neighborhoods. Our models use the scores to mark bots. BotMark performs automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors by ensemble of the detection results based on similarity scores, stability scores and anomaly scores. We collect a very large size of network traffic by simulating 5 newly propagated botnets, including Mirai, Black energy, Zeus, Athena and Ares in a real computing environment. Extensive experimental results demonstrate the effectiveness of BotMark. It achieves 99.94% in terms of detection accuracy, outperforming any individual detector with flow-based detection or graph-based detection. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:284 / 296
页数:13
相关论文
共 50 条
  • [1] Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic
    Shang, Yaoyao
    Yang, Shuangmao
    Wang, Wei
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 612 - 621
  • [2] Flow-Based Consensus Partitions for Botnet Detection
    Mai, Long
    Kim, YoungPin
    Choi, DongHo
    Nguyen Khac Bao
    Phan, Trung V.
    Park, Minho
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 1253 - 1255
  • [3] A novel graph-based approach for IoT botnet detection
    Huy-Trung Nguyen
    Quoc-Dung Ngo
    Van-Hoang Le
    International Journal of Information Security, 2020, 19 : 567 - 577
  • [4] Botnet detection using graph-based feature clustering
    Chowdhury S.
    Khanzadeh M.
    Akula R.
    Zhang F.
    Zhang S.
    Medal H.
    Marufuzzaman M.
    Bian L.
    Journal of Big Data, 4 (1)
  • [5] A novel graph-based approach for IoT botnet detection
    Huy-Trung Nguyen
    Quoc-Dung Ngo
    Van-Hoang Le
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (05) : 567 - 577
  • [6] Botnet detection based on traffic behavior analysis and flow intervals
    Zhao, David
    Traore, Issa
    Sayed, Bassam
    Lu, Wei
    Saad, Sherif
    Ghorbani, Ali
    Garant, Dan
    COMPUTERS & SECURITY, 2013, 39 : 2 - 16
  • [7] Botnet Detection Approach Using Graph-Based Machine Learning
    Alharbi, Afnan
    Alsubhi, Khalid
    IEEE ACCESS, 2021, 9 (09): : 99166 - 99180
  • [8] Flow-based Identification of Botnet Traffic by Mining Multiple Log Files
    Masud, Mohammad M.
    Al-Khateeb, Tahseen
    Khan, Latifur
    Thuraisingham, Bhavani
    Hamlen, Kevin W.
    DFMA 2008: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS & APPLICATIONS, PROCEEDINGS, 2008, : 200 - 206
  • [9] SybilHunter: Hybrid graph-based sybil detection by aggregating user behaviors
    Mao, Jian
    Li, Xiang
    Luo, Xiling
    Lin, Qixiao
    NEUROCOMPUTING, 2022, 500 : 295 - 306
  • [10] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399