BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Authors

Abstract:

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in bots activitiesto detect the botnet. In this paper, we present a host-based method that candetect individual bot-infected hosts. This approach is based on botnet life-cycle,which includes common symptoms of almost all types of botnet despite theirdifferences. We analyze network activities of each process running on thehost and propose some heuristics to distinguish behavioral patterns of botprocess from legitimate ones based on statistical features of packet sequencesand evaluating an overall security risk for it. To show the effectiveness of theapproach, a tool named BotRevealer has been implemented and evaluatedusing real botnets and several popular applications. The results show that inspite of diversity of botnets, BotRevealer can effectively detect the bot processamong other active processes.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Agent-based Modeling and Simulation of Botnets and Botnet Defense

Nowadays we are witnesses of the rapid spread of botnets across the Internet and using them for different cyber attacks against our systems. Botnets join a huge number of compromised computers in the Internet and allow using these computers for performing vulnerability scans, distributing denial-of-service (DDoS) attacks and sending enormous amounts of spam emails. It is a very complex task to ...

full text

Survey on network-based botnet detection methods

Botnets are an important security problem on the Internet. They continuously evolve their structure, protocols and attacks. This survey analyzes and compares the most important efforts carried out in a network-based detection area. It accomplishes four tasks: first, the comparison of previous surveys and the proposal of four new dimensions to analyze their classification schemes; second, a new ...

full text

On Detection of Storm Botnets

A botnet, which is a group of compromised and remotelycontrolled computers (also called bots), poses a serious threat to the Internet. The commonly-used command and control (C&C) channel for a botnet is used by a central server, such as IRC or HTTP. Recently, Storm botnet, a P2Pbased botnet with a decentralized C&C channel has appeared in the wild. In this paper, we propose a distributed approa...

full text

Botnet Detection Based on Network Behavior

Current techniques for detecting botnets examine traffic content for IRC commands, monitor DNS for strange usage, or set up honeynets to capture live bots. Our botnet detection approach is to examine flow characteristics such as bandwidth, packet timing, and burst duration for evidence of botnet command and control activity. We have constructed an architecture that first eliminates traffic that...

full text

Botnet Detection Technology Based on DNS

With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously strengthens a botnet’s survivability to evade detection. This paper focuses on evasion and detection techniques of DNS-based botnets and gives a review ...

full text

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 10  issue 1

pages  55- 61

publication date 2018-01-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023