On the detection and identification of botnets

被引:12
|
作者
Seewald, Alexander K. [1 ]
Gansterer, Wilfried N. [2 ]
机构
[1] Seewald Solut, Vienna, Austria
[2] Univ Vienna, Res Lab Computat Technol & Applicat, Vienna, Austria
关键词
Botnet; E-mail spam; Traffic analysis; Machine learning; IT security;
D O I
10.1016/j.cose.2009.07.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We develop and discuss automated and self-adaptive systems for detecting and classifying botnets based on machine learning techniques and integration of human expertise. The proposed concept is purely passive and is based on analyzing information collected at three levels: (i) the payload of single packets received, (ii) observed access patterns to a darknet at the level of network traffic, and (iii) observed contents of TCP/IP traffic at the protocol level. We illustrate experiments based on real-life data collected with a darknet set up for this purpose to show the potential of the proposed concept for Levels (i) and (ii). As darknets cannot capture TCP/IP traffic data, we use a small spamtrap in our experiments at Level (iii). Strictly speaking, this approach for Level (iii) is not purely passive. However, traffic moving through a network could potentially be analyzed in a similar way to also obtain a purely passive system at this level. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:45 / 58
页数:14
相关论文
共 50 条
  • [41] Identifying botnets using anomaly detection techniques applied to DNS traffic
    Villamarin-Salomon, Ricardo
    Brustoloni, Jose Carlos
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 476 - 481
  • [42] BotMosaic: Collaborative network watermark for the detection of IRC-based botnets
    Houmansadr, Amir
    Borisov, Nikita
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (03) : 707 - 715
  • [43] A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models
    Alomari, Dorieh M.
    Anis, Fatima
    Alabdullatif, Maryam
    Aljamaan, Hamoud
    27TH INTERNATIONAL CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2023, 2023, : 493 - 498
  • [44] Rapid detection technique for P2P-based botnets
    Yu, Ge
    Yu, Xiao-Cong
    Dong, Xiao-Mei
    Qin, Yu-Hai
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (12): : 1709 - 1712
  • [45] Identifying DGA-based botnets using network anomaly detection
    Gavrilut, Dragos Teodor
    Popoiu, George
    Benchea, Razvan
    PROCEEDINGS OF 2016 18TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 292 - 299
  • [46] Stop Botnets
    Susan
    新高考(英语进阶), 2016, (英语进阶) : 51 - 53
  • [47] Stop Botnets
    Susan
    新高考(英语进阶), 2016, (Z2) : 51 - 53
  • [48] From Botnets to MobiBots: A Novel Malicious Communication Paradigm for Mobile Botnets
    Mtibaa, Abderrahmen
    Harras, Khaled A.
    Alnuweiri, Hussein
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (08) : 61 - 67
  • [49] Battle of the botnets
    Mansfield-Devine S.
    Network Security, 2010, 2010 (05) : 4 - 6
  • [50] Analysis of P2P, IRC and HTTP traffic for botnets detection
    Basil AsSadhan
    Abdulmuneem Bashaiwth
    Jalal Al-Muhtadi
    Saleh Alshebeili
    Peer-to-Peer Networking and Applications, 2018, 11 : 848 - 861