A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means

Shing-Han Li, Yucheng Kao, Zongshen Zhang, Ying-Ping Chuang, D. Yen
{"title":"A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means","authors":"Shing-Han Li, Yucheng Kao, Zongshen Zhang, Ying-Ping Chuang, D. Yen","doi":"10.1145/2676869","DOIUrl":null,"url":null,"abstract":"In today's world, Botnet has become one of the greatest threats to network security. Network attackers, or Botmasters, use Botnet to launch the Distributed Denial of Service (DDoS) to paralyze large-scale websites or steal confidential data from infected computers. They also employ “phishing” attacks to steal sensitive information (such as users’ accounts and passwords), send bulk email advertising, and/or conduct click fraud. Even though detection technology has been much improved and some solutions to Internet security have been proposed and improved, the threat of Botnet still exists. Most of the past studies dealing with this issue used either packet contents or traffic flow characteristics to identify the invasion of Botnet. However, there still exist many problems in the areas of packet encryption and data privacy, simply because Botnet can easily change the packet contents and flow characteristics to circumvent the Intrusion Detection System (IDS). This study combines Particle Swarm Optimization (PSO) and K-means algorithms to provide a solution to remedy those problems and develop, step by step, a mechanism for Botnet detection. First, three important network behaviors are identified: long active communication behavior (ActBehavior), connection failure behavior (FailBehavior), and network scanning behavior (ScanBehavior). These behaviors are defined according to the relevant prior studies and used to analyze the communication activities among the infected computers. Second, the features of network behaviors are extracted from the flow traces in the network layer and transport layer of the network equipment. Third, PSO and K-means techniques are used to uncover the host members of Botnet in the organizational network. This study mainly utilizes the flow traces of a campus network as an experiment. The experimental findings show that this proposed approach can be employed to detect the suspicious Botnet members earlier than the detection application systems. In addition, this proposed approach is easy to implement and can be further used and extended in the campus dormitory network, home networks, and the mobile 3G network.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"42","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Trans. Manag. Inf. Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2676869","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 42

Abstract

In today's world, Botnet has become one of the greatest threats to network security. Network attackers, or Botmasters, use Botnet to launch the Distributed Denial of Service (DDoS) to paralyze large-scale websites or steal confidential data from infected computers. They also employ “phishing” attacks to steal sensitive information (such as users’ accounts and passwords), send bulk email advertising, and/or conduct click fraud. Even though detection technology has been much improved and some solutions to Internet security have been proposed and improved, the threat of Botnet still exists. Most of the past studies dealing with this issue used either packet contents or traffic flow characteristics to identify the invasion of Botnet. However, there still exist many problems in the areas of packet encryption and data privacy, simply because Botnet can easily change the packet contents and flow characteristics to circumvent the Intrusion Detection System (IDS). This study combines Particle Swarm Optimization (PSO) and K-means algorithms to provide a solution to remedy those problems and develop, step by step, a mechanism for Botnet detection. First, three important network behaviors are identified: long active communication behavior (ActBehavior), connection failure behavior (FailBehavior), and network scanning behavior (ScanBehavior). These behaviors are defined according to the relevant prior studies and used to analyze the communication activities among the infected computers. Second, the features of network behaviors are extracted from the flow traces in the network layer and transport layer of the network equipment. Third, PSO and K-means techniques are used to uncover the host members of Botnet in the organizational network. This study mainly utilizes the flow traces of a campus network as an experiment. The experimental findings show that this proposed approach can be employed to detect the suspicious Botnet members earlier than the detection application systems. In addition, this proposed approach is easy to implement and can be further used and extended in the campus dormitory network, home networks, and the mobile 3G network.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于PSO和k均值的网络行为僵尸网络检测机制
在当今世界,僵尸网络已经成为网络安全的最大威胁之一。网络攻击者(botmaster)利用僵尸网络(Botnet)发动分布式拒绝服务(DDoS)攻击,使大型网站瘫痪或从受感染的计算机上窃取机密数据。他们还使用“网络钓鱼”攻击来窃取敏感信息(如用户的帐户和密码),发送大量电子邮件广告,和/或进行点击欺诈。尽管检测技术已经有了很大的进步,并且已经提出和改进了一些网络安全解决方案,但是僵尸网络的威胁仍然存在。过去的研究大多采用数据包内容或流量特征来识别僵尸网络的入侵。然而,在数据包加密和数据隐私方面仍然存在许多问题,因为僵尸网络可以很容易地改变数据包内容和流量特征来绕过入侵检测系统(IDS)。本研究结合粒子群优化(PSO)和K-means算法提供解决方案,以补救这些问题,并逐步开发僵尸网络检测机制。首先,确定了三种重要的网络行为:长时间主动通信行为(ActBehavior)、连接失败行为(FailBehavior)和网络扫描行为(ScanBehavior)。这些行为是根据先前的相关研究定义的,并用于分析受感染计算机之间的通信活动。其次,从网络设备的网络层和传输层的流迹中提取网络行为特征;第三,利用PSO和K-means技术揭示组织网络中僵尸网络的主机成员。本研究主要利用校园网的流量轨迹作为实验。实验结果表明,该方法可以比检测应用系统更早地检测出可疑的僵尸网络成员。此外,该方法易于实现,可以在校园宿舍网、家庭网络和移动3G网络中进一步使用和扩展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Using Social Media to Analyze Public Concerns and Policy Responses to COVID-19 in Hong Kong COVID-Safe Spatial Occupancy Monitoring Using OFDM-Based Features and Passive WiFi Samples SymptomID: A Framework for Rapid Symptom Identification in Pandemics Using News Reports Leveraging Individual and Collective Regularity to Profile and Segment User Locations from Mobile Phone Data Write Like a Pro or an Amateur? Effect of Medical Language Formality
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1