TY - GEN
T1 - A hybrid technique to detect botnets, based on P2P traffic similarity
AU - Khan, Riaz Ullah
AU - Kumar, Rajesh
AU - Alazab, Mamoun
AU - Zhang, Xiaosong
PY - 2019/5/1
Y1 - 2019/5/1
N2 - The botnet has been one of the most common threats to the network security since it exploits multiple malicious codes like worm, Trojans, Rootkit, etc. These botnets are used to perform the attacks, send phishing links, and/or provide malicious services. It is difficult to detect Peer-to-peer (P2P) botnets as compare to IRC (Internet Relay Chat), HTTP (HyperText Transfer Protocol) and other types of botnets because of having typical features of the centralization and distribution. To solve these problems, we propose an effective two-stage traffic classification method to detect P2P botnet traffic based on both non-P2P traffic filtering mechanism and machine learning techniques on conversation features. At the first stage, we filter non-P2P packages to reduce the amount of network traffic through well-known ports, DNS query, and flow counting. At the second stage, we extract conversation features based on data flow features and flow similarity. We detected P2P botnets successfully, by using Machine Learning Classifiers. Experimental evaluations show that our two-stage detection method has a higher accuracy than traditional P2P botnet detection methods.
AB - The botnet has been one of the most common threats to the network security since it exploits multiple malicious codes like worm, Trojans, Rootkit, etc. These botnets are used to perform the attacks, send phishing links, and/or provide malicious services. It is difficult to detect Peer-to-peer (P2P) botnets as compare to IRC (Internet Relay Chat), HTTP (HyperText Transfer Protocol) and other types of botnets because of having typical features of the centralization and distribution. To solve these problems, we propose an effective two-stage traffic classification method to detect P2P botnet traffic based on both non-P2P traffic filtering mechanism and machine learning techniques on conversation features. At the first stage, we filter non-P2P packages to reduce the amount of network traffic through well-known ports, DNS query, and flow counting. At the second stage, we extract conversation features based on data flow features and flow similarity. We detected P2P botnets successfully, by using Machine Learning Classifiers. Experimental evaluations show that our two-stage detection method has a higher accuracy than traditional P2P botnet detection methods.
KW - Anomaly Detection
KW - Botnet detection
KW - Feature Extraction
KW - P2P traffic identification
UR - http://www.scopus.com/inward/record.url?scp=85073869793&partnerID=8YFLogxK
U2 - 10.1109/CCC.2019.00008
DO - 10.1109/CCC.2019.00008
M3 - Conference Paper published in Proceedings
T3 - Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019
SP - 136
EP - 142
BT - Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019
PB - IEEE, Institute of Electrical and Electronics Engineers
T2 - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019
Y2 - 7 May 2019 through 8 May 2019
ER -