DocumentCode
3585877
Title
Botnet identification via universal anomaly detection
Author
Siboni, Shachar ; Cohen, Asaf
Author_Institution
Dept. of Commun. Syst. Eng., Ben-Gurion Univ., Beer-Sheva, Israel
fYear
2014
Firstpage
101
Lastpage
106
Abstract
The problem of identifying and detecting Botnets Command and Control (C&C) channels is considered. A Botnet is a logical network of compromised machines (Bots) which are remotely controlled by an attacker (Botmaster) using a C&C infrastructure in order to perform malicious activities. Accordingly, a key objective is to identify and block the C&C before any real harm is caused. We propose an anomaly detection algorithm and apply it to timing data, which can be collected without deep inspection, from open as well as encrypted flows. The suggested algorithm utilizes the Lempel Ziv universal compression algorithm in order to optimally give a probability assignment for normal traffic (during learning), then estimate the likelihood of new sequences (during operation) and classify them accordingly. Furthermore, the algorithm is generic and can be applied to any sequence of events, not necessarily traffic-related. We evaluate the detection algorithm on real-world network traces, showing how a universal, low complexity C&C identifi- cation system can be built, with high detection rates for a given false-alarm probability.
Keywords
computer network security; invasive software; probability; telecommunication traffic; Botmaster; Botnet C-and-C channels; Botnet command-and-control channel detection; Botnet command-and-control channel identification; C-and-C block; Lempel Ziv universal compression algorithm; anomaly detection algorithm; encrypted flows; false-alarm probability; logical network; malicious activities; normal traffic; open flows; probability assignment; real-world network traces; remotely controlled compromised machines; sequence classification; sequence likelihood estimation; timing data; universal anomaly detection; universal-low complexity C-and-C identification system; Dictionaries; Prediction algorithms; Probability; Quantization (signal); Radiation detectors; Testing; Training;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
Type
conf
DOI
10.1109/WIFS.2014.7084311
Filename
7084311
Link To Document