首页> 外文会议>2011 International Conference on Computer Applications and Industrial Electronics >An anomaly-based botnet detection approach for identifying stealthy botnets
【24h】

An anomaly-based botnet detection approach for identifying stealthy botnets

机译:基于异常的僵尸网络检测方法,用于识别隐形僵尸网络

获取原文
获取原文并翻译 | 示例

摘要

Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. We start from inherent characteristics of botnets. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and performing same attacks. Our method clusters bots with similar netflows and attacks in different time windows and perform correlation to identify bot infected hosts. We have developed a prototype system and evaluated it with real-world traces including normal traffic and several real-world botnet traces. The results show that our approach has high detection accuracy and low false positive.
机译:僵尸网络(受感染计算机的网络)通常用于恶意活动,例如垃圾邮件,点击欺诈,身份盗用,网络钓鱼和分布式拒绝服务(DDoS)攻击。以前的大多数研究都介绍了完全或部分基于签名的僵尸网络检测方法。在本文中,我们提出了一种完全基于异常的方法,不需要对僵尸程序签名,僵尸网络C&C协议和C&C服务器地址有先验知识。我们从僵尸网络的固有特征开始。机器人连接到C&C通道并执行接收到的命令。属于同一僵尸网络的僵尸程序会收到相同的命令,从而使它们具有相似的网络流特征并执行相同的攻击。我们的方法将具有相似网络流和攻击的bot聚集在不同的时间窗口中,并执行关联以识别被bot感染的主机。我们已经开发了一个原型系统,并使用包括正常流量和一些实际僵尸网络跟踪在内的实际跟踪进行了评估。结果表明,该方法具有较高的检测精度和较低的误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号