Flow-Based Identification Of Botnet Traffic By Mining Multiple Log Files

DFMA 2008: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS & APPLICATIONS, PROCEEDINGS(2008)

引用 106|浏览29
暂无评分
摘要
Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected hosts (bots) to control the bots. If this traffic van be detected. both the C&C center and the bots it controls can be detected and the botnet can be. disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that hots respond much faster Than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect hot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.
更多
查看译文
关键词
Malware,botnet,intrusion detection,data mining
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要