An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

11/02/2018
by   Sajjad Arshad, et al.
0

Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. We start from inherent characteristics of botnets. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and performing same attacks. Our method clusters bots with similar netflows and attacks in different time windows and perform correlation to identify bot infected hosts. We have developed a prototype system and evaluated it with real-world traces including normal traffic and several real-world botnet traces. The results show that our approach has high detection accuracy and low false positive.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/15/2020

A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate

The complexity and ubiquity of modern computing systems is a fertile gro...
research
10/04/2020

DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

Detecting covert channels among legitimate traffic represents a severe c...
research
09/28/2022

Anomaly detection optimization using big data and deep learning to reduce false-positive

Anomaly-based Intrusion Detection System (IDS) has been a hot research t...
research
12/22/2021

Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection

We demonstrate that a supply-chain level compromise of the adaptive crui...
research
07/10/2018

BAD: Blockchain Anomaly Detection

Anomaly detection tools play a role of paramount importance in protectin...
research
03/12/2019

Detection of LDDoS Attacks Based on TCP Connection Parameters

Low-rate application layer distributed denial of service (LDDoS) attacks...
research
05/28/2020

Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning

The simultaneous charging of many electric vehicles (EVs) stresses the d...

Please sign up or login with your details

Forgot password? Click here to reset