CABD: A Content Agnostic Botnet Detection System
نویسنده
چکیده
A botnet is a network of compromised hosts controlled by a single entity, called the botmaster. These compromised hosts can be utilized for malicious activities such as Distributed Denial of Service (DDoS) attacks, SPAM, and information extraction such as the extraction of user authentication via key-logging each of which nets profits to the botmaster. Research in the detection of botnets is extensive and ongoing. Previous techniques looked at packet contents to determine botnet command and control (C&C) traffic, however botnets are evolving and as such are encrypting their traffic. Therefore content agnostic botnet detection mechanisms are needed. This paper presents CABD a content agnostic botnet detection system to detect bot infected hosts inside a network. CABD should work independent of the underlying botnet structure, be able to detect infected hosts without the correlation of network events between two or more hosts, and, as “content agnostic” implies, perform detection in spite of encryption. Furthermore CABD should not depend on noisy malicious activities, such as SPAM and DDoS traffic, and finally CABD should have an acceptably low false positive rate. CABD should generate content agnostic botnet traffic signatures in a three step process. First CABD will summarize known botnet traffic flows collected from long running instances of Anubis [2]. Second CABD will cluster similar flows together, and finally CABD will extract unique information from each cluster to produce a signature usable in an system similar to a network intrusion detection system (NIDS). When complete, CABD will be evaluated using various large-scale, real-world network traffic traces that will hopefully verify that CABD does indeed produce an acceptably low number of false positives.
منابع مشابه
BotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملBotMosaic: Collaborative Network Watermark for Botnet Detection
Recent research has made great strides in the field of detecting botnets. However, botnets of all kinds continue to plague the Internet, as many ISPs and organizations do not deploy these techniques. We aim to mitigate this state by creating a very low-cost method of detecting infected bot host. Our approach is to leverage the botnet detection work carried out by some organizations to easily lo...
متن کاملBotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle
Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...
متن کاملMentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists
The Domain Name System (DNS) is an essential infrastructure service on the internet. It provides a worldwide mapping between easily memorizable domain names and numerical IP addresses. Today, legitimate users and malicious applications use this service to locate content on the internet. Yet botnets increasingly rely on DNS to connect to their command and control servers. A widespread approach t...
متن کاملBotnet Detection Based on Network Behavior
Current techniques for detecting botnets examine traffic content for IRC commands, monitor DNS for strange usage, or set up honeynets to capture live bots. Our botnet detection approach is to examine flow characteristics such as bandwidth, packet timing, and burst duration for evidence of botnet command and control activity. We have constructed an architecture that first eliminates traffic that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010