期刊文献+

Analysis on the time-domain characteristics of botnets control traffic

Analysis on the time-domain characteristics of botnets control traffic
原文传递
导出
摘要 Botnets are networks composed with malware-infect ed computers.They are designed and organized to be controlled by an adversary.As victims are infected through their inappropriate network behaviors in most cases,the Internet protocol(IP) addresses of infected bots are unpredictable.Plus,a bot can get an IP address through dynamic host configuration protocol(DHCP),so they need to get in touch with the controller initiatively and they should attempt continuously because a controller can't be always online.The whole process is carried out under the command and control(C&C) channel.Our goal is to characterize the network traffic under the C&C channel on the time domain.Our analysis draws upon massive data obtained from honeynet and a large Internet service provider(ISP) Network.We extract and summarize fingerprints of the bots collected in our honeynet.Next,with the fingerprints,we use deep packet inspection(DPI) Technology to search active bots and controllers in the Internet.Then,we gather and analyze flow records reported from network traffic monitoring equipments.In this paper,we propose a flow record interval analysis on the time domain characteristics of botnets control traffic,and we propose the algorithm to identify the communications in the C&C channel based on our analysis.After that,we evaluate our approach with a 3.4 GB flow record trace and the result is satisfactory.In addition,we believe that our work is also useful information in the design of botnet detection schemes with the deep flow inspection(DFI) technology. Botnets are networks composed with malware-infect ed computers.They are designed and organized to be controlled by an adversary.As victims are infected through their inappropriate network behaviors in most cases,the Internet protocol(IP) addresses of infected bots are unpredictable.Plus,a bot can get an IP address through dynamic host configuration protocol(DHCP),so they need to get in touch with the controller initiatively and they should attempt continuously because a controller can't be always online.The whole process is carried out under the command and control(C&C) channel.Our goal is to characterize the network traffic under the C&C channel on the time domain.Our analysis draws upon massive data obtained from honeynet and a large Internet service provider(ISP) Network.We extract and summarize fingerprints of the bots collected in our honeynet.Next,with the fingerprints,we use deep packet inspection(DPI) Technology to search active bots and controllers in the Internet.Then,we gather and analyze flow records reported from network traffic monitoring equipments.In this paper,we propose a flow record interval analysis on the time domain characteristics of botnets control traffic,and we propose the algorithm to identify the communications in the C&C channel based on our analysis.After that,we evaluate our approach with a 3.4 GB flow record trace and the result is satisfactory.In addition,we believe that our work is also useful information in the design of botnet detection schemes with the deep flow inspection(DFI) technology.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第2期106-113,共8页 中国邮电高校学报(英文版)
基金 supported by the National Science & Technology Pillar Program (2008BAH37B04)
关键词 botnet detection netflow record time domain analysis deep flow inspection botnet detection, netflow record, time domain analysis, deep flow inspection
  • 相关文献

参考文献13

  • 1Chiang K, Lloyd L. A case study of the Rustock rootldt and spam bot. Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots'07), Apr 10-11, 2007, Cambridge, MA, USA. Berkeley, CA, USA: USENIX Association, 2007. 被引量:1
  • 2Cooke E, Jahanian F, McPherson D. The zombie roundup: Understanding, detecting, and disturbing botnets. Proceedings of the 1st Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'05), Jul 7-8, 2005, Cambridge, MA, USA. Berkeley, CA, USA: USENIX Association, 2005: 39-44. 被引量:1
  • 3Xie Y L, Yu F, Achan K,et al. Spamming botnets: Signatures and charactersfics. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Commtmications (SIGCOMM'08), Aug 17-22, 2008, Seattle, WA, USA. New York, NY, USA: ACM, 2008:171-182. 被引量:1
  • 4Villamarin-Salomon R, Brustoloni J C. Bayesian bot detection based on DNS traffic similarity. Proceedings of the 2009 ACM Symposium on Applied Computing (SAC'09), Mar 8-12, 2009, Honolulu, HI, USA. New York, NY, USA: ACM, 2009:2035-2041. 被引量:1
  • 5Lu W, Tavallaee M, Ghorbani A A. Automatic discovery of botnet communities on large-scale communication networks. Proceedings of the 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS'09), Mar 10-12, 2009, Sydney, Australia. New York, NY, USA: ACM, 2009:1-10. 被引量:1
  • 6Karasaridis A, Rexroad B, Hoeflin D. Wide-scale botnet detection and characterization. Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots'07), Apr 10-11, 2007, Cambridge, MA, USA. Berkeley, CA, USA: USENIX Association, 2007. 被引量:1
  • 7Cheng Fang, Wang Peng. Development of modem network testing. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition: 2008.20(Sup): 57-60 (in Chinese). 被引量:1
  • 8AsSadhan B, Moura J M F, Lapsley D, et al. Detecting botnets using command and control traffic. Proceedings of the 8th IEEE International Symposium on Network Computing and Applications (NCA'09), Jul 9-11, 2009, Cambridge, MA, USA. Los Alamitos, CA, USA: IEEE Computer Society, 2009:156-162. 被引量:1
  • 9Stone-Gross B, Cova B, CavaUaro L, et al. Your botnet is, my bomet: Analysis of a bomet takeover. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), Nov 9-13, 2009, Chicago, IL, USA. New York, NY, USA: ACM, 2009. 被引量:1
  • 10Wei C, Sprague A, Warner G. Detection of networks blocks used by the storm worm botnet. Proceedings of the ACM Southeast Regional Conference (ACM-SE'08), Mar 28-29, 2008, Auburn, AL, USA. New York, NY, USA: ACM, 2008:356-360. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部