Cargando…

An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic

Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its...

Descripción completa

Detalles Bibliográficos
Autores principales: AsSadhan, Basil, Moura, José M.F.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4294756/
https://www.ncbi.nlm.nih.gov/pubmed/25685512
http://dx.doi.org/10.1016/j.jare.2013.11.005
_version_ 1782352764059254784
author AsSadhan, Basil
Moura, José M.F.
author_facet AsSadhan, Basil
Moura, José M.F.
author_sort AsSadhan, Basil
collection PubMed
description Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet’s C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that it exhibits a periodic behavior. This is due to the pre-programmed behavior of bots that check for updates to download them every T seconds. We exploit this periodic behavior to detect C2 traffic. The detection involves evaluating the periodogram of the monitored traffic. Then applying Walker’s large sample test to the periodogram’s maximum ordinate in order to determine if it is due to a periodic component or not. If the periodogram of the monitored traffic contains a periodic component, then it is highly likely that it is due to a bot’s C2 traffic. The test looks only at aggregate control plane traffic behavior, which makes it more scalable than techniques that involve deep packet inspection (DPI) or tracking the communication flows of different hosts. We apply the test to two types of botnet, tinyP2P and IRC that are generated by SLINGbot. We verify the periodic behavior of their C2 traffic and compare it to the results we get on real traffic that is obtained from a secured enterprise network. We further study the characteristics of the test in the presence of injected HTTP background traffic and the effect of the duty cycle on the periodic behavior.
format Online
Article
Text
id pubmed-4294756
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-42947562015-02-14 An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic AsSadhan, Basil Moura, José M.F. J Adv Res Original Article Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet’s C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that it exhibits a periodic behavior. This is due to the pre-programmed behavior of bots that check for updates to download them every T seconds. We exploit this periodic behavior to detect C2 traffic. The detection involves evaluating the periodogram of the monitored traffic. Then applying Walker’s large sample test to the periodogram’s maximum ordinate in order to determine if it is due to a periodic component or not. If the periodogram of the monitored traffic contains a periodic component, then it is highly likely that it is due to a bot’s C2 traffic. The test looks only at aggregate control plane traffic behavior, which makes it more scalable than techniques that involve deep packet inspection (DPI) or tracking the communication flows of different hosts. We apply the test to two types of botnet, tinyP2P and IRC that are generated by SLINGbot. We verify the periodic behavior of their C2 traffic and compare it to the results we get on real traffic that is obtained from a secured enterprise network. We further study the characteristics of the test in the presence of injected HTTP background traffic and the effect of the duty cycle on the periodic behavior. Elsevier 2014-07 2013-11-27 /pmc/articles/PMC4294756/ /pubmed/25685512 http://dx.doi.org/10.1016/j.jare.2013.11.005 Text en © 2013 Production and hosting by Elsevier B.V. http://creativecommons.org/licenses/by-nc-nd/3.0/ This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/).
spellingShingle Original Article
AsSadhan, Basil
Moura, José M.F.
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
title An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
title_full An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
title_fullStr An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
title_full_unstemmed An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
title_short An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
title_sort efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
topic Original Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4294756/
https://www.ncbi.nlm.nih.gov/pubmed/25685512
http://dx.doi.org/10.1016/j.jare.2013.11.005
work_keys_str_mv AT assadhanbasil anefficientmethodtodetectperiodicbehaviorinbotnettrafficbyanalyzingcontrolplanetraffic
AT mourajosemf anefficientmethodtodetectperiodicbehaviorinbotnettrafficbyanalyzingcontrolplanetraffic
AT assadhanbasil efficientmethodtodetectperiodicbehaviorinbotnettrafficbyanalyzingcontrolplanetraffic
AT mourajosemf efficientmethodtodetectperiodicbehaviorinbotnettrafficbyanalyzingcontrolplanetraffic