Botnet Detection Using DNS and HTTP Traffic Analysis

Agung Udiyono, Charles Lim, Lukas
{"title":"Botnet Detection Using DNS and HTTP Traffic Analysis","authors":"Agung Udiyono, Charles Lim, Lukas","doi":"10.1145/3429789.3429818","DOIUrl":null,"url":null,"abstract":"To perform a large scale attack on the victim, cyber attacker usually prepares thousands if not millions of infected computers to accomplish the goal. Once the infected computers, also called botnet, are ready, they will communicate with the Command and Control (C&C) server to obtain the instruction to perform their acts. Botnet tries to disguise their communication as regular traffic by using commonly used protocols such as HTTP so that their conversation with C&C is not blocked by the firewall. This research explores botnet's footprints using both HTTP and DNS protocols and analyzes their behaviors to select the most appropriate features of HTTP and DNS protocols to be used in our classification model. The developed model has been shown to provide 86% accuracy in distinguishing botnet from benign traffic on the enterprise network.","PeriodicalId":416230,"journal":{"name":"Proceedings of the 2021 International Conference on Engineering and Information Technology for Sustainable Industry","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 International Conference on Engineering and Information Technology for Sustainable Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3429789.3429818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

To perform a large scale attack on the victim, cyber attacker usually prepares thousands if not millions of infected computers to accomplish the goal. Once the infected computers, also called botnet, are ready, they will communicate with the Command and Control (C&C) server to obtain the instruction to perform their acts. Botnet tries to disguise their communication as regular traffic by using commonly used protocols such as HTTP so that their conversation with C&C is not blocked by the firewall. This research explores botnet's footprints using both HTTP and DNS protocols and analyzes their behaviors to select the most appropriate features of HTTP and DNS protocols to be used in our classification model. The developed model has been shown to provide 86% accuracy in distinguishing botnet from benign traffic on the enterprise network.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于DNS的僵尸网络检测和HTTP流量分析
为了对受害者进行大规模攻击,网络攻击者通常会准备数千台(如果不是数百万台的话)受感染的计算机来完成目标。一旦被感染的计算机(也称为僵尸网络)准备好了,它们就会与命令与控制(C&C)服务器通信,以获得执行其行为的指令。僵尸网络试图通过使用常用的协议(如HTTP)将其通信伪装成常规流量,这样它们与C&C的对话就不会被防火墙阻止。本研究使用HTTP和DNS协议探索僵尸网络的足迹,并分析它们的行为,以选择最合适的HTTP和DNS协议特征用于我们的分类模型。所开发的模型已被证明在区分企业网络上的僵尸网络和良性流量方面提供86%的准确率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Simple Vertical Axis Wind Turbine for Low Wind Speed Gain Optimization for Cutting Tests on CNC Machine Using the Ballbar Method with CMM Machine Measurements Strategic Energy Management Model in A Cement Plant in Indonesia Study on The Potential Application of Water Hyacinth as An Organic Corrosion Inhibitor Safety Riding Behavior Tendency among College Students Related to Driving Attitude, Riding Knowledge, and Emotional Intelligence Level
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1