Title :
Detecting P2P botnets through network behavior analysis and machine learning
Author :
Saad, Sherif ; Traore, Issa ; Ghorbani, Ali ; Sayed, Bassam ; Zhao, David ; Lu, Wei ; Felix, John ; Hakimian, Payman
Author_Institution :
Electr. & Comput. Eng., Univ. Of Victoria, Victoria, BC, Canada
Abstract :
Botnets have become one of the major threats on the Internet for serving as a vector for carrying attacks against organizations and committing cybercrimes. They are used to generate spam, carry out DDOS attacks and click-fraud, and steal sensitive information. In this paper, we propose a new approach for characterizing and detecting botnets using network traffic behaviors. Our approach focuses on detecting the bots before they launch their attack. We focus in this paper on detecting P2P bots, which represent the newest and most challenging types of botnets currently available. We study the ability of five different commonly used machine learning techniques to meet online botnet detection requirements, namely adaptability, novelty detection, and early detection. The results of our experimental evaluation based on existing datasets show that it is possible to detect effectively botnets during the botnet Command-and-Control (C&C) phase and before they launch their attacks using traffic behaviors only. However, none of the studied techniques can address all the above requirements at once.
Keywords :
Internet; fraud; learning (artificial intelligence); peer-to-peer computing; security of data; unsolicited e-mail; C&C phase; DDOS attacks; Internet; P2P botnets; click-fraud; command-and-control phase; cybercrimes; machine learning; network behavior analysis; network traffic behaviors; spam;
Conference_Titel :
Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4577-0582-3
DOI :
10.1109/PST.2011.5971980