• DocumentCode
    3672036
  • Title

    Periodicity classification of HTTP traffic to detect HTTP Botnets

  • Author

    Meisam Eslahi;M. S. Rohmad;Hamid Nilsaz;Maryam Var Naseri;N.M. Tahir;H. Hashim

  • Author_Institution
    Faculty of Electrical Engineering, Universiti Teknologi MARA, Malaysia
  • fYear
    2015
  • fDate
    4/1/2015 12:00:00 AM
  • Firstpage
    119
  • Lastpage
    123
  • Abstract
    Recently, the HTTP based Botnet threat has become a serious challenge for security experts as Bots can be distributed quickly and stealthily. With the HTTP protocol, Bots hide their communication flows within the normal HTTP flows making them more stealthy and difficult to detect. Furthermore, since the HTTP service is being widely used by the Internet applications, it is not easy to block this service as a precautionary measure and other techniques are required to detect and deter the Bot menace. The HTTP Bots periodically connect to particular web pages or URLs to get commands and updates from the Botmaster. In fact, this identifiable periodic connection pattern has been used in several studies as a feature to detect HTTP Botnets. In this paper, we review the current studies on detection of periodic communications in HTTP Botnets as well as the shortcomings of these methods. Consequently, we propose three metrics to be used in identifying the types of communication patterns according to their periodicity. Test results show that in addition to detecting HTTP Botnet communication patterns with 80% accuracy, the proposed method is able to efficiently classify communication patterns into several periodicity categories.
  • Keywords
    "Command and control systems","Measurement","Radio frequency","Security","Servers","Internet","Decision trees"
  • Publisher
    ieee
  • Conference_Titel
    Computer Applications & Industrial Electronics (ISCAIE), 2015 IEEE Symposium on
  • Type

    conf

  • DOI
    10.1109/ISCAIE.2015.7298339
  • Filename
    7298339