Author_Institution :
Dept. of Comput. Sci. & Eng., Korea Univ., Seoul, South Korea
Abstract :
Botnets are widely used for acquiring economic profits, by launching attacks such as distributed denial-of-service (DDoS), identification theft, ad-ware installation, mass spamming, and click frauds. Many approaches have been proposed to detect botnet, which rely on end-host installations or operate on network traffic with deep packet inspection. They have limitations for detecting botnets which use evasion techniques such as packet encryption, fast flux, dynamic DNS and DGA. Sporadic botnet behavior caused by disconnecting the power of system or botnet´s own nature also brings unignorable false detection. Furthermore, normal user´s traffic causes a lot of false alarms. In this paper, we propose a novel approach called PsyBoG to detect botnets by capturing periodic activities. PsyBoG leverages signal processing techniques, PSD (Power Spectral Density) analysis, to discover the major frequencies from the periodic DNS queries of botnets. The PSD analysis allows us to detect sophisticated botnets irrespective of their evasion techniques, sporadic behavior and even the noise traffic generated by normal users. To evaluate PsyBoG, we utilize the real-world DNS traces collected from a /16 campus network including more than 48,046K queries, 34K distinct IP addresses and 146K domains. Finally, PsyBoG caught 19 unknown and 6 known botnet groups with 0.1% false positives.
Keywords :
IP networks; fraud; invasive software; signal processing; spectral analysis; telecommunication traffic; DDoS; IP addresses; PSD analysis; PsyBoG; ad-ware installation; botnet group detection; click fraud; distributed denial-of-service; dynamic DGA; dynamic DNS; economic profit; end-host installation; evasion techniques; false detection; fast flux; identification theft; mass spamming; network traffic; noise traffic; packet encryption; packet inspection; periodic DNS query; periodic activity; power spectral density analysis; real-world DNS traces; signal processing technique; sophisticated botnet; sporadic behavior; sporadic botnet behavior; IP networks; Sensors; Servers; Signal processing; Testing; Time series analysis; Unsolicited electronic mail; Botnet detection; Group Activity; Power Spectral Density;