BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors

被引:142
|
作者
Wang, Wei [1 ,2 ]
Shang, Yaoyao [1 ,2 ]
He, Yongzhong [1 ,2 ]
Li, Yidong [1 ,2 ]
Liu, Jiqiang [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, 3 Shangyuancun, Beijing 100044, Peoples R China
[2] Beijing Jiaotong Univ, Sch Comp & Informat Technol, 3 Shangyuancun, Beijing 100044, Peoples R China
关键词
Botnet detection; Network security; Intrusion detection; Network monitoring; Machine learning; AUDIT DATA STREAMS; INTRUSION; ANOMALIES; FEATURES;
D O I
10.1016/j.ins.2019.09.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Botnets have become one of the most serious threats to cyber infrastructure. Most existing work on detecting botnets is based on flow-based traffic analysis by mining their communication patterns. There also exists related work based on anomaly detection in communication graphs. As bots have continuously evolved and become increasingly sophisticated, only using flow-based traffic analysis or graph-based analysis for the detection would result in false negatives or false positives, or can even be evaded. In this work, we propose BotMark, an automated model that detects botnets with hybrid analysis of flow-based and graph-based network traffic behaviors. We extract 15 statistical flow-based traffic features as well as 3 graph-based features in building the detection model. For flow-based detection, we consider the similarity and stability of C-flow as measurements in the detection. In particular, we employ k-means to measure the similarity of C-flows and assign similarity scores, and calculate stability score of C-flows through the distribution of packet length within a C-flow. The graph-based detection is based on the observation that the neighborhoods of anomalous nodes significantly differ from those of normal nodes in communication graphs. In particular, we use least-square technique and Local Outlier Factor (LOF) to calculate anomaly scores that measure the differences of their neighborhoods. Our models use the scores to mark bots. BotMark performs automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors by ensemble of the detection results based on similarity scores, stability scores and anomaly scores. We collect a very large size of network traffic by simulating 5 newly propagated botnets, including Mirai, Black energy, Zeus, Athena and Ares in a real computing environment. Extensive experimental results demonstrate the effectiveness of BotMark. It achieves 99.94% in terms of detection accuracy, outperforming any individual detector with flow-based detection or graph-based detection. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:284 / 296
页数:13
相关论文
共 50 条
  • [21] Behaviour based botnet detection with traffic analysis and flow interavals using PSO and SVM
    Kapre, Amruta
    Padmavathi, B.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 718 - 722
  • [22] Adaptive behaviour pattern based botnet detection using traffic analysis and flow interavals
    2017, Institute of Electrical and Electronics Engineers Inc., United States (2017-January):
  • [23] Adaptive behaviour pattern based botnet detection using traffic analysis and flow interavals
    Kapre, Amruta
    Padmavathi, B.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 410 - 414
  • [24] Botnet Detection Based on Traffic Monitoring
    Zeidanloo, Hossein Rouhani
    Manaf, Azizah Bt
    Vahdani, Payam
    Tabatabaei, Farzaneh
    Zamani, Mazdak
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 97 - 101
  • [25] Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks
    Huoh, Ting-Li
    Luo, Yan
    Li, Peilong
    Zhang, Tong
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1224 - 1237
  • [26] Towards effectively feature graph-based IoT botnet detection via reinforcement learning
    Quoc-Dung Ngo
    Huy-Trung Nguyen
    Le-Cuong Nguyen
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 41 (06) : 6801 - 6814
  • [27] Knowledge Graph-based Support for Automated Manufacturability Analysis
    Grangel-Gonzalez, Irlan
    Loesch, Felix
    ul Mehdi, Anees
    2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,
  • [28] Towards an Efficient Approach Using Graph-Based Evolutionary Algorithm for IoT Botnet Detection
    Ngo Q.-D.
    Nguyen H.-T.
    Informatica (Slovenia), 2023, 47 (06): : 97 - 104
  • [29] A Distributed Botnet Detecting Approach Based on Traffic Flow Analysis
    Li Sheng
    Liu Zhiming
    He Jin
    Deng Gaoming
    Huang Wen
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 124 - 128
  • [30] Peer to Peer Botnet Detection Based on Network Traffic Analysis
    Almutairi, Suzan
    Mahfoudh, Saoucene
    Alowibdi, Jalal S.
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,