Detecting botnet by anomalous traffic

被引:21
|
作者
Chen, Chia-Mei [1 ]
Lin, Hsiao-Chung [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Informat Management, Kaohsiung 804, Taiwan
关键词
Botnet detection; Intrusion detection; IRC;
D O I
10.1016/j.jisa.2014.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets can cause significant security threat and huge loss to organizations, and are difficult to discover their existence. Therefore they have become one of the most severe threats on the Internet. The core component of botnets is their command and control channel. Botnets often use IRC (Internet Relay Chat) as a communication channel through which the botmaster can control the bots to launch attacks or propagate more infections. In this paper, anomaly score based botnet detection is proposed to identify the botnet activities by using the similarity measurement and the periodic characteristics of botnets. To improve the detection rate, the proposed system employs two-level correlation relating the set of hosts with same anomaly behaviors. The proposed method can differentiate the malicious network traffic generated by infected hosts (bots) from that by normal IRC clients, even in a network with only a very small number of bots. The experiment results show that, regardless the size of the botnet in a network, the proposed approach efficiently detects abnormal IRC traffic and identifies botnet activities. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [21] Using Wavelets for Compression and Detecting Events in Anomalous Network Traffic
    Kyriakopoulos, Konstantinos G.
    Parish, David J.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 195 - 200
  • [22] Detecting botnet membership with DNSBL counterintelligence
    Ramachandran, Anirudh
    Feamster, Nick
    Dagon, David
    BOTNET DETECTION: COUNTERING THE LARGEST SECURITY THREAT, 2008, 36 : 131 - 142
  • [23] Heuristics for Detecting Botnet Coordinated Attacks
    Kuwabara, Kazuya
    Kikuchi, Hiroaki
    Terada, Masato
    Fujiwara, Masashi
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 603 - 607
  • [24] Analysis and Characterisation of Botnet Scan Traffic
    Marnerides, Angelos K.
    Mauthe, Andreas U.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,
  • [25] An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone
    Zang, Xiao-Dong
    Gong, Jian
    Hu, Xiao-Yan
    IEEE ACCESS, 2019, 7 : 56920 - 56934
  • [26] Detecting anomalous network traffic with combined fuzzy-based approaches
    He, HT
    Luo, XN
    Liu, BL
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 433 - 442
  • [27] Detecting anomalous traffic using statistical discriminator and neural decisional motor
    Baldassarri, Paola
    Montesanto, Anna
    Puliti, Paolo
    BIO-INSPIRED MODELING OF COGNITIVE TASKS, PT 1, PROCEEDINGS, 2007, 4527 : 367 - +
  • [28] Event Graphs for the Observation of Botnet Traffic
    Acarali, Dilara
    Rajarajan, Muttukrishnan
    Komninos, Nikos
    Herwono, Ian
    2017 8TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2017, : 628 - 634
  • [29] A Practical Analysis on Mirai Botnet Traffic
    Gallopeni, Getoar
    Rodrigues, Bruno
    Franco, Muriel
    Stiller, Burkhard
    2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), 2020, : 667 - 668
  • [30] Data Confirmation for Botnet Traffic Analysis
    Haddadi, Fariba
    Zincir-Heywood, A. Nur
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 329 - 336