Flow-based Identification of Botnet Traffic by Mining Multiple Log Files

被引:0
|
作者
Masud, Mohammad M. [1 ]
Al-Khateeb, Tahseen [1 ]
Khan, Latifur [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin W. [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75080 USA
关键词
Malware; botnet; intrusion detection; data mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected hosts (bots) to control the bots. If this traffic van be detected. both the C&C center and the bots it controls can be detected and the botnet can be. disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that hots respond much faster Than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect hot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.
引用
收藏
页码:200 / 206
页数:7
相关论文
共 50 条
  • [31] Material flow-based economic assessment of landfill mining processes
    Kieckhaefer, Karsten
    Breitenstein, Anna
    Spengler, Thomas S.
    WASTE MANAGEMENT, 2017, 60 : 748 - 764
  • [32] Flow-based Load Balancing of Web Traffic using OpenFlow
    Al-Najjar, Anees
    Teed, Samuel
    Indulska, Jadwiga
    Portmann, Marius
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 7 - 12
  • [33] Traffic Flow-based Roadside Unit Allocaton Strategy for VANET
    Chi, Jeonghee
    Do, Sunyoung
    Park, Soyoung
    2016 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2016, : 245 - 250
  • [34] Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic
    Shang, Yaoyao
    Yang, Shuangmao
    Wang, Wei
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 612 - 621
  • [35] Method of detecting IRC Botnet based on the multi-features of traffic flow
    Yan, Jian-En
    Yuan, Chun-Yang
    Xu, Hai-Yan
    Zhang, Zhao-Xin
    Tongxin Xuebao/Journal on Communications, 2013, 34 (10): : 49 - 55
  • [36] Optical flow-based person tracking by multiple cameras
    Tsutsui, H
    Miura, J
    Shirai, Y
    MFI2001: INTERNATIONAL CONFERENCE ON MULTISENSOR FUSION AND INTEGRATION FOR INTELLIGENT SYSTEMS, 2001, : 91 - 96
  • [37] IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
    Xiao, Jie
    Huang, Changcheng
    Yan, James
    PROCEEDINGS OF THE 2010 IEEE-IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2010, : 232 - 239
  • [38] A Fast Systolic Priority Queue Architecture for a Flow-Based Traffic Manager
    Benacer, Imad
    Boyer, Francois-Raymond
    Belanger, Normand
    Savaria, Yvon
    2016 14TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2016,
  • [39] A High-Speed Traffic Manager Architecture for Flow-Based Networking
    Benacer, Imad
    Boyer, Francois-Raymond
    Savaria, Yvon
    2017 IEEE 15TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2017, : 161 - 164
  • [40] A flow-based approach to modeling ADSL traffic on an IP backbone link
    Ben Azzouna, N
    Clérot, F
    Fricker, C
    Guillemin, F
    ANNALS OF TELECOMMUNICATIONS, 2004, 59 (11-12) : 1260 - 1299