Title :
Botnet identification via universal anomaly detection
Author :
Siboni, Shachar ; Cohen, Asaf
Author_Institution :
Dept. of Commun. Syst. Eng., Ben-Gurion Univ., Beer-Sheva, Israel
Abstract :
The problem of identifying and detecting Botnets Command and Control (C&C) channels is considered. A Botnet is a logical network of compromised machines (Bots) which are remotely controlled by an attacker (Botmaster) using a C&C infrastructure in order to perform malicious activities. Accordingly, a key objective is to identify and block the C&C before any real harm is caused. We propose an anomaly detection algorithm and apply it to timing data, which can be collected without deep inspection, from open as well as encrypted flows. The suggested algorithm utilizes the Lempel Ziv universal compression algorithm in order to optimally give a probability assignment for normal traffic (during learning), then estimate the likelihood of new sequences (during operation) and classify them accordingly. Furthermore, the algorithm is generic and can be applied to any sequence of events, not necessarily traffic-related. We evaluate the detection algorithm on real-world network traces, showing how a universal, low complexity C&C identifi- cation system can be built, with high detection rates for a given false-alarm probability.
Keywords :
computer network security; invasive software; probability; telecommunication traffic; Botmaster; Botnet C-and-C channels; Botnet command-and-control channel detection; Botnet command-and-control channel identification; C-and-C block; Lempel Ziv universal compression algorithm; anomaly detection algorithm; encrypted flows; false-alarm probability; logical network; malicious activities; normal traffic; open flows; probability assignment; real-world network traces; remotely controlled compromised machines; sequence classification; sequence likelihood estimation; timing data; universal anomaly detection; universal-low complexity C-and-C identification system; Dictionaries; Prediction algorithms; Probability; Quantization (signal); Radiation detectors; Testing; Training;
Conference_Titel :
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
DOI :
10.1109/WIFS.2014.7084311