DCA for Bot Detection

01/13/2010
by   Yousof Al-Hammadi, et al.
0

Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a 'bot' - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the 'botmaster of a botnet'. In this work, we use the biologically inspired Dendritic Cell Algorithm (DCA) to detect the existence of a single bot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the application of the DCA to the detection of a single bot show that the algorithm is a successful technique for the detection of such malicious software without responding to normally running programs.

READ FULL TEXT
research
04/22/2010

Performance Evaluation of DCA and SRC on a Single Bot Detection

Malicious users try to compromise systems using new techniques. One of t...
research
06/02/2010

Métodos para la Selección y el Ajuste de Características en el Problema de la Detección de Spam

The email is used daily by millions of people to communicate around the ...
research
01/14/2010

Dendritic Cells for Real-Time Anomaly Detection

Dendritic Cells (DCs) are innate immune system cells which have the powe...
research
06/14/2010

Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Reseaux de Neurones

We present an application of Artificial Intelligence techniques to the f...
research
03/22/2010

Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory

The analysis of system calls is one method employed by anomaly detection...
research
02/05/2010

Detecting Bots Based on Keylogging Activities

A bot is a piece of software that is usually installed on an infected ma...
research
06/04/2015

Defending against malicious peripherals with Cinch

Malicious peripherals designed to attack their host computers are a grow...

Please sign up or login with your details

Forgot password? Click here to reset