• DocumentCode
    2748265
  • Title

    Flow-based identification of botnet traffic by mining multiple log files

  • Author

    Masud, Mohammad M. ; Al-Khateeb, Tahseen ; Khan, Latifur ; Thuraisingham, Bhavani ; Hamlen, Kevin W.

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Texas at Dallas, Richardson, TX
  • fYear
    2008
  • fDate
    21-22 Oct. 2008
  • Firstpage
    200
  • Lastpage
    206
  • Abstract
    Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected, hosts (bots) to control the bots. If this traffic can be detected, both the C&C center and the bots it controls can be detected, and the botnet can be disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that bots respond much faster than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect bot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.
  • Keywords
    data mining; distributed programming; invasive software; telecommunication security; telecommunication traffic; Command and Control traffic; botnet detection; botnet traffic; data mining; exedump; flow-based identification; host-based log files; multiple log file mining; multiple log-file based temporal correlation technique; tcpdump; Command and control systems; Data mining; Feature extraction; Humans; Telecommunication traffic; Malware; botnet; data mining; intrusion detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Distributed Framework and Applications, 2008. DFmA 2008. First International Conference on
  • Conference_Location
    Penang
  • Print_ISBN
    978-1-4244-2312-5
  • Electronic_ISBN
    978-1-4244-2313-2
  • Type

    conf

  • DOI
    10.1109/ICDFMA.2008.4784437
  • Filename
    4784437