Detecting botnet by anomalous traffic

被引:21
|
作者
Chen, Chia-Mei [1 ]
Lin, Hsiao-Chung [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Informat Management, Kaohsiung 804, Taiwan
关键词
Botnet detection; Intrusion detection; IRC;
D O I
10.1016/j.jisa.2014.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets can cause significant security threat and huge loss to organizations, and are difficult to discover their existence. Therefore they have become one of the most severe threats on the Internet. The core component of botnets is their command and control channel. Botnets often use IRC (Internet Relay Chat) as a communication channel through which the botmaster can control the bots to launch attacks or propagate more infections. In this paper, anomaly score based botnet detection is proposed to identify the botnet activities by using the similarity measurement and the periodic characteristics of botnets. To improve the detection rate, the proposed system employs two-level correlation relating the set of hosts with same anomaly behaviors. The proposed method can differentiate the malicious network traffic generated by infected hosts (bots) from that by normal IRC clients, even in a network with only a very small number of bots. The experiment results show that, regardless the size of the botnet in a network, the proposed approach efficiently detects abnormal IRC traffic and identifies botnet activities. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [1] Detecting Encrypted Botnet Traffic
    Zhang, Han
    Papadopoulos, Christos
    Massey, Dan
    2013 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2013, : 163 - 168
  • [2] Detecting Encrypted Botnet Traffic
    Zhang, Han
    Papadopoulos, Christos
    Massey, Dan
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 3453 - 3458
  • [3] Detecting HTTP Botnet with Clustering Network Traffic
    Cai, Tao
    Zou, Futai
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [4] Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
    Debashi, Mohamed
    Vickers, Paul
    IEEE ACCESS, 2018, 6 : 33826 - 33839
  • [5] A Distributed Botnet Detecting Approach Based on Traffic Flow Analysis
    Li Sheng
    Liu Zhiming
    He Jin
    Deng Gaoming
    Huang Wen
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 124 - 128
  • [6] Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic
    Thomas, Matthew
    Mohaisen, Aziz
    WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, : 707 - 712
  • [7] Detecting Encrypted Botnet Traffic Using Spatial-Temporal Correlation
    Wei, Chen
    Le, Yu
    Geng, Yang
    CHINA COMMUNICATIONS, 2012, 9 (10) : 49 - 59
  • [8] Detecting Anomalous Network Traffic in IoT Networks
    Dang Hai Hoang
    Ha Duong Nguyen
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 1143 - 1152
  • [9] A Botnet Detecting Infrastructure Using a Beneficial Botnet
    Yamanoue, Takashi
    PROCEEDINGS OF THE 2018 ACM SIGUCCS ANNUAL CONFERENCE (SIGUCCS '18), 2018, : 35 - 42
  • [10] A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes
    Shobana, M.
    Poonkuzhali, Sugumaran
    SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 534 - 548