首页> 美国卫生研究院文献>Journal of Advanced Research >An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
【2h】

An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic

机译:通过分析控制平面流量来检测僵尸网络流量中周期性行为的有效方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet’s C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that it exhibits a periodic behavior. This is due to the pre-programmed behavior of bots that check for updates to download them every T seconds. We exploit this periodic behavior to detect C2 traffic. The detection involves evaluating the periodogram of the monitored traffic. Then applying Walker’s large sample test to the periodogram’s maximum ordinate in order to determine if it is due to a periodic component or not. If the periodogram of the monitored traffic contains a periodic component, then it is highly likely that it is due to a bot’s C2 traffic. The test looks only at aggregate control plane traffic behavior, which makes it more scalable than techniques that involve deep packet inspection (DPI) or tracking the communication flows of different hosts. We apply the test to two types of botnet, tinyP2P and IRC that are generated by SLINGbot. We verify the periodic behavior of their C2 traffic and compare it to the results we get on real traffic that is obtained from a secured enterprise network. We further study the characteristics of the test in the presence of injected HTTP background traffic and the effect of the duty cycle on the periodic behavior.
机译:僵尸网络是大型的僵尸网络(受感染的机器),受少数僵尸主机的控制。它们对Internet的通信和应用程序构成了重大威胁。僵尸网络依靠其成员之间的命令和控制(C2)通信通道来执行攻击。 C2流量发生在任何攻击之前;因此,通过检测僵尸网络的C2流量,可以在真正的危害发生之前检测到僵尸网络的成员。我们分析了C2流量,发现它表现出周期性的行为。这是由于漫游器的预编程行为会每隔T秒检查一次更新以下载更新。我们利用这种周期性行为来检测C2流量。该检测涉及评估所监视流量的周期图。然后,将Walker的大样本测试应用于周期图的最大纵坐标,以确定是否是由于周期分量引起的。如果所监控流量的周期图包含周期性成分,则很可能是由于漫游器的C2流量造成的。该测试仅关注聚合控制平面流量行为,这使其比涉及深度数据包检查(DPI)或跟踪不同主机的通信流的技术更具可伸缩性。我们将测试应用于SLINGbot生成的两种类型的僵尸网络,tinyP2P和IRC。我们验证其C2流量的周期性行为,并将其与从安全企业网络获得的真实流量的结果进行比较。我们进一步研究了在注入HTTP背景流量的情况下测试的特征以及占空比对周期性行为的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号