首页> 外文会议>Intelligent, secure, and dependable systems in distributed and cloud environments >Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis
【24h】

Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis

机译:基于DNS流量分析的HTTP僵尸网络检测整体模型

获取原文
获取原文并翻译 | 示例

摘要

HTTP botnets are currently the most popular form of botnets compared to IRC and P2P botnets. This is because, they are not only easier to implement, operate, and maintain, but they can easily evade the detection. Likewise, HTTP botnets flows can easily be buried in the huge volume of legitimate HTTP traffic occurring in many organizations, which makes the detection harder. In this paper, a new detection framework involving three detection models is proposed, which can run independently or in tandem. The first detector profiles the individual applications based on their interactions, and isolates accordingly the malicious ones. The second detector tracks the regularity in the timing of the bot DNS queries, and uses this as basis for detection. The third detector analyzes the characteristics of the domain names involved in the DNS, and identifies the algorithmically generated and fast flux domains, which are staples of typical HTTP botnets. Several machine learning classifiers are investigated for each of the detectors. Experimental evaluation using public datasets and datasets collected in our testbed yield very encouraging performance results.
机译:与IRC和P2P僵尸网络相比,HTTP僵尸网络是目前最受欢迎的僵尸网络形式。这是因为它们不仅易于实施,操作和维护,而且可以轻松避开检测。同样,HTTP僵尸网络流可以很容易地掩埋在许多组织中发生的大量合法HTTP流量中,这使得检测更加困难。本文提出了一种新的包含三个检测模型的检测框架,它们可以独立运行,也可以串联运行。第一个检测器根据各个应用程序的交互来对其进行概要分析,并相应地隔离恶意应用程序。第二个检测器跟踪bot DNS查询时间的规律性,并以此为基础进行检测。第三个检测器分析DNS中涉及的域名的特征,并识别算法生成的快速通量域,这些域是典型HTTP僵尸网络的主要组成部分。为每个检测器研究了几种机器学习分类器。使用公共数据集和在我们的测试床中收集的数据集进行的实验评估产生了令人鼓舞的性能结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号