Detecting botnet by anomalous traffic

被引:21
|
作者
Chen, Chia-Mei [1 ]
Lin, Hsiao-Chung [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Informat Management, Kaohsiung 804, Taiwan
关键词
Botnet detection; Intrusion detection; IRC;
D O I
10.1016/j.jisa.2014.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets can cause significant security threat and huge loss to organizations, and are difficult to discover their existence. Therefore they have become one of the most severe threats on the Internet. The core component of botnets is their command and control channel. Botnets often use IRC (Internet Relay Chat) as a communication channel through which the botmaster can control the bots to launch attacks or propagate more infections. In this paper, anomaly score based botnet detection is proposed to identify the botnet activities by using the similarity measurement and the periodic characteristics of botnets. To improve the detection rate, the proposed system employs two-level correlation relating the set of hosts with same anomaly behaviors. The proposed method can differentiate the malicious network traffic generated by infected hosts (bots) from that by normal IRC clients, even in a network with only a very small number of bots. The experiment results show that, regardless the size of the botnet in a network, the proposed approach efficiently detects abnormal IRC traffic and identifies botnet activities. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [41] Detecting an Anomalous Traffic Attack Area based on Entropy Distribution and Mahalanobis Distance
    Bayarjargal, Dolgormaa
    Cho, Gihwan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 87 - 94
  • [42] Detecting anomalous traffic using statistical processing and self-organizing maps
    Baldassari, Paola
    Montesanto, Anna
    Puliti, Paolo
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 74 - 79
  • [43] Detecting anomalous behavior: Optimization of network traffic parameters vla an evolution strategy
    Bauer, DC
    Cannady, J
    Garcia, RC
    IEEE SOUTHEASTCON 2001: ENGINEERING THE FUTURE, PROCEEDINGS, 2001, : 34 - 39
  • [44] Botnet Detecting Method Based on Activity Similarity
    Wan Wei
    Li Jun
    2014 4TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2014, : 373 - 376
  • [45] Botnet traffic identification using neural networks
    Rajib Biswas
    Sambuddha Roy
    Multimedia Tools and Applications, 2021, 80 : 24147 - 24171
  • [46] Botnet Protocol Inference in the Presence of Encrypted Traffic
    De Carli, Lorenzo
    Torres, Ruben
    Modelo-Howard, Gaspar
    Tongaonkar, Alok
    Jha, Somesh
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [47] A Novel HTTP Botnet Traffic Detection Method
    Tyagi, Rohit
    Paul, Tuhin
    Manoj, B. S.
    Thanudas, B.
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [48] Machine learning based Botnet Identification Traffic
    Azab, Ahmad
    Alazab, Mamoun
    Aiash, Mahdi
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1788 - 1794
  • [49] Discovering New Indicators for Botnet Traffic Detection
    Adamov, Alexander
    Hahanov, Vladimir
    Carlsson, Anders
    2014 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2014,
  • [50] Conformal Clustering and Its Application to Botnet Traffic
    Cherubin, Giovanni
    Nouretdinov, Ilia
    Gammerman, Alexander
    Jordaney, Roberto
    Wang, Zhi
    Papini, Davide
    Cavallaro, Lorenzo
    STATISTICAL LEARNING AND DATA SCIENCES, 2015, 9047 : 313 - 322