2014
DOI: 10.1016/j.jare.2013.11.005
|View full text |Cite
|
Sign up to set email alerts
|

An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic

Abstract: Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet’s C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 36 publications
(49 citation statements)
references
References 9 publications
0
49
0
Order By: Relevance
“…Our clustering model is based on C-flow and its four features [1]. A C-flow is a collection of all flows over a period of time.…”
Section: Network Traffic Clusteringmentioning
confidence: 99%
See 2 more Smart Citations
“…Our clustering model is based on C-flow and its four features [1]. A C-flow is a collection of all flows over a period of time.…”
Section: Network Traffic Clusteringmentioning
confidence: 99%
“…But they can be ineffective when bot variants are encountered. As for behavior-based detection, AsSadhan et al [1] detected botnet by finding the periodic behavior from network traffic. The advantage of such technique is that it is based on a basic property shared by many botnet variants and is independent of the structure (e.g., centralized, P2P) and C&C protocol (e.g., IRC, HTTP).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The protocol hidden behavior analysis issue is given an undocumented protocol program C and captured protocol message M, monitoring and analy zing the process of C parsing M, (1) building the protocol behavior instruction sequences ; (2) inferring the potential trigger conditions according to the public behavior instruction sequences ; (3) mining and triggering the protocol's hidden behavior by static clustering analysis; (4) finally, evaluating the protocol's execution security. Our approach us es dynamic binary analysis combin ing static clustering techniques, which is based on the intuition that the most important protocol behavior is contained in the message parsing process.…”
Section: System Overviewmentioning
confidence: 99%
“…Having mo re knowledge of netwo rk protocol is of great value in many network security applications, such as deep packet inspection [1] , botnet analysis [2] , vulnerability discovery [3] and signature generation [4] . Most protocol reverse analysis focus on analyzing and inferring unknown protocol specifications, such as message format and fields [5] , but pay litt le attention to the protocol's behavior.…”
Section: Introductionmentioning
confidence: 99%