Using entropy of traffic features to identify bot infected hosts

B. Soniya, M. Wilscy
{"title":"Using entropy of traffic features to identify bot infected hosts","authors":"B. Soniya, M. Wilscy","doi":"10.1109/RAICS.2013.6745439","DOIUrl":null,"url":null,"abstract":"Botnets are proliferating on the web and are increasingly being used by criminals for data theft, denial of service attacks, spamming and such other activities. Several bot detection approaches have been proposed which can be classified as either host-based or network-based. A hybrid approach which mitigates the disadvantages of the previous two approaches is proposed here. The proposed method aims to identify bots on a single host by looking at the network traffic generated by the host. The detection method is designed for HTTP traffic. A characterization of normal HTTP traffic as well as bot traffic is initially done using features extracted from network packets. A Neural Network Classifier is trained using these traffic features and later used to classify unlabeled traffic as benign or malicious. A normal traffic profile is first used to filter out packets to commonly accessed destinations thereby reducing the workload on the classifier. Stealthy bots which communicate at large time intervals of up to 32 hours are also detected. 120 bots samples were used to evaluate the system. The experimental results demonstrate a high detection rate of 97.4% and a very low false positive rate of 2.5%. The performance of the system is compared with many recent bot detection methods.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAICS.2013.6745439","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Botnets are proliferating on the web and are increasingly being used by criminals for data theft, denial of service attacks, spamming and such other activities. Several bot detection approaches have been proposed which can be classified as either host-based or network-based. A hybrid approach which mitigates the disadvantages of the previous two approaches is proposed here. The proposed method aims to identify bots on a single host by looking at the network traffic generated by the host. The detection method is designed for HTTP traffic. A characterization of normal HTTP traffic as well as bot traffic is initially done using features extracted from network packets. A Neural Network Classifier is trained using these traffic features and later used to classify unlabeled traffic as benign or malicious. A normal traffic profile is first used to filter out packets to commonly accessed destinations thereby reducing the workload on the classifier. Stealthy bots which communicate at large time intervals of up to 32 hours are also detected. 120 bots samples were used to evaluate the system. The experimental results demonstrate a high detection rate of 97.4% and a very low false positive rate of 2.5%. The performance of the system is compared with many recent bot detection methods.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用流量特征熵来识别僵尸感染主机
僵尸网络正在网络上扩散,并且越来越多地被犯罪分子用于数据盗窃、拒绝服务攻击、垃圾邮件和其他活动。已经提出了几种机器人检测方法,可分为基于主机的和基于网络的。这里提出了一种混合方法,它减轻了前两种方法的缺点。提出的方法旨在通过查看主机产生的网络流量来识别单个主机上的机器人。该检测方法是针对HTTP流量设计的。对正常HTTP流量和bot流量的描述最初是使用从网络数据包中提取的特征来完成的。神经网络分类器使用这些流量特征进行训练,然后用于将未标记的流量分类为良性或恶意。首先使用正常的流量配置文件来过滤到通常访问的目的地的数据包,从而减少分类器的工作量。在长达32小时的时间间隔内进行通信的隐形机器人也被检测到。120个机器人样本被用来评估系统。实验结果表明,该方法的检测率高达97.4%,假阳性率很低,仅为2.5%。将该系统的性能与目前许多机器人检测方法进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Dynamic gesture recognition of Indian sign language considering local motion of hand using spatial location of Key Maximum Curvature Points OFDM radio based range and direction sensor for robotics applications A new built in self test pattern generator for low power dissipation and high fault coverage Reconfigurable ultrasonic beamformer Clustering of web sessions by FOGSAA
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1