Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System

被引:1
|
作者
Al-Nawasrah, Ahmad [1 ]
Almomani, Ammar [2 ,3 ]
Al-Issa, Huthaifa A. [4 ]
Alissa, Khalid [5 ]
Alrosan, Ayat [6 ]
Alaboudi, Abdulellah A. [7 ]
Gupta, Brij B. [8 ]
机构
[1] British Univ Bahrain, Informat & Commun Technol Coll, Saar, Bahrain
[2] Al Balqa Appl Univ, Al Huson Univ Coll, IT Dept, POB 50, Irbid, Jordan
[3] Skyline Univ Coll, Res & Innovat Dept, POB 1797, Sharjah, U Arab Emirates
[4] Al Balqa Appl Univ, Al Huson Univ Coll, Elect & Elect Engn Dept, As Salt, Jordan
[5] Shaqra Univ, Coll Comp & Informat Technol, POB 33, Riyadh, Saudi Arabia
[6] Imam Abdulrahman Bin Faisal Univ, Dept Networks & Commun, Coll Comp Sci & Informat Technol, Saudi ARAMCO Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
[7] Skyline Univ Coll, Sch Informat Technol, POB 1797, Sharjah, U Arab Emirates
[8] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
来源
JOURNAL OF WEB ENGINEERING | 2022年 / 21卷 / 02期
关键词
Hybrid supervised fast-flux; botnet detection; DeSNN; DDOS ATTACKS; MITIGATION; NETWORKS; DOMAINS;
D O I
10.13052/jwe1540-9589.2123
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A Fast Flux Service Network (FFSN) domain name system method is a technique used on botnet that bot herders used to support malicious botnet actions to rapidly change the domain name IP addresses and to increase the life of malicious servers. While several methods for the detection of FFSN domains are suggested, they are still suffering from relatively low accuracy with the zero-day domain in particular. Throughout the current research, a system that's deemed new is proposed. The latter system is called (the Fast Flux Killer System) and is abbreviated as (FFKS)). It allows one to have the FF-Domains "zero-day", via a deployment built on (ADeSNN). It is a hybrid, which consists of two stages. The online phase according to the learning outcomes from the offline phase works on detecting the zero-day domains while the offline phase helps in enhancing the classification performance of the system in the online phase. This system will be compared to a previously published work that was based on a supervised detection method using the same ADeSNN algorithm to have the FFSNs domains detected, also to show better performance in detecting malicious domains. A public data set for the impacts of the hybrid ADeSNN algorithm is employed in the experiment. When hybrid ADeSNN was used over the supervised one, the experiments showed better accuracy. The detection of zero-day fast-flux domains is highly accurate (99.54%) in a mode considered as an online one.
引用
收藏
页码:179 / 201
页数:23
相关论文
共 50 条
  • [21] An Improvement for Fast-Flux Service Networks Detection Based on Data Mining Techniques
    Chen, Ziniu
    Wang, Jian
    Zhou, Yujian
    Li, Chunping
    ROUGH SETS, FUZZY SETS, DATA MINING AND GRANULAR COMPUTING, RSFDGRC 2011, 2011, 6743 : 302 - 309
  • [22] Botnet attack detection in IoT using hybrid optimisation enabled deep stacked autoencoder network
    Kalidindi, Archana
    Arrama, Mahesh Babu
    INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2023, 22 (02) : 77 - 88
  • [23] Fast-flucos: malicious domain name detection method for Fast-flux based on DNS traffic
    Han C.
    Zhang Y.
    Zhang Y.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (05): : 37 - 47
  • [24] Android Botnet Detection Using Hybrid Analysis
    Arhsad, Mamoona
    Karim, Ahmad
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (03): : 704 - 719
  • [25] Botnet Detection on TCP Traffic Using Supervised Machine Learning
    Velasco-Mata, Javier
    Fidalgo, Eduardo
    Gonzalez-Castro, Victor
    Alegre, Enrique
    Blanco-Medina, Pablo
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2019, 2019, 11734 : 444 - 455
  • [26] Mobile Botnet Attacks Detection Using Supervised Learning Algorithms
    Mohammadi, Hassan
    Hosseini, Soodeh
    SECURITY AND PRIVACY, 2025, 8 (02):
  • [27] Real-time Fast-flux Identification via Localized Spatial Geolocation Detection
    Wang, Horng-Tzer
    Mao, Ching-Hao
    Wu, Kuo-Ping
    Lee, Hahn-Ming
    2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 244 - 252
  • [28] MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents
    Banks, Greg
    Fattori, Aristide
    Kemmerer, Richard
    Kruegel, Christopher
    Vigna, Giovanni
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 184 - 193
  • [29] Fast Flux Botnet Detection Framework using Adaptive Dynamic Evolving Spiking Neural Network Algorithm
    Al-Nawasrah, Ahmad
    Al-Momani, Ammar
    Meziane, Farid
    Alauthman, Mohammad
    2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2018, : 7 - 11
  • [30] Genetic-based Real-time Fast-Flux Service Networks Detection
    Lin, Hui-Tang
    Lin, Ying-You
    Chiang, Jui-Wei
    COMPUTER NETWORKS, 2013, 57 (02) : 501 - 513