Cargando…

Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic

Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication protocols. One of the widely used communicati...

Descripción completa

Detalles Bibliográficos
Autores principales: Al-mashhadi, Saif, Anbar, Mohammed, Hasbullah, Iznan, Alamiedy, Taief Alaa
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8372004/
https://www.ncbi.nlm.nih.gov/pubmed/34458571
http://dx.doi.org/10.7717/peerj-cs.640
_version_ 1783739751750172672
author Al-mashhadi, Saif
Anbar, Mohammed
Hasbullah, Iznan
Alamiedy, Taief Alaa
author_facet Al-mashhadi, Saif
Anbar, Mohammed
Hasbullah, Iznan
Alamiedy, Taief Alaa
author_sort Al-mashhadi, Saif
collection PubMed
description Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication protocols. One of the widely used communication protocols is the ‘Domain Name System’ (DNS) service, an essential Internet service. Bot-masters utilise Domain Generation Algorithms (DGA) and fast-flux techniques to avoid static blacklists and reverse engineering while remaining flexible. However, botnet’s DNS communication generates anomalous DNS traffic throughout the botnet life cycle, and such anomaly is considered an indicator of DNS-based botnets presence in the network. Despite several approaches proposed to detect botnets based on DNS traffic analysis; however, the problem still exists and is challenging due to several reasons, such as not considering significant features and rules that contribute to the detection of DNS-based botnet. Therefore, this paper examines the abnormality of DNS traffic during the botnet lifecycle to extract significant enriched features. These features are further analysed using two machine learning algorithms. The union of the output of two algorithms proposes a novel hybrid rule detection model approach. Two benchmark datasets are used to evaluate the performance of the proposed approach in terms of detection accuracy and false-positive rate. The experimental results show that the proposed approach has a 99.96% accuracy and a 1.6% false-positive rate, outperforming other state-of-the-art DNS-based botnet detection approaches.
format Online
Article
Text
id pubmed-8372004
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-83720042021-08-26 Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic Al-mashhadi, Saif Anbar, Mohammed Hasbullah, Iznan Alamiedy, Taief Alaa PeerJ Comput Sci Data Mining and Machine Learning Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication protocols. One of the widely used communication protocols is the ‘Domain Name System’ (DNS) service, an essential Internet service. Bot-masters utilise Domain Generation Algorithms (DGA) and fast-flux techniques to avoid static blacklists and reverse engineering while remaining flexible. However, botnet’s DNS communication generates anomalous DNS traffic throughout the botnet life cycle, and such anomaly is considered an indicator of DNS-based botnets presence in the network. Despite several approaches proposed to detect botnets based on DNS traffic analysis; however, the problem still exists and is challenging due to several reasons, such as not considering significant features and rules that contribute to the detection of DNS-based botnet. Therefore, this paper examines the abnormality of DNS traffic during the botnet lifecycle to extract significant enriched features. These features are further analysed using two machine learning algorithms. The union of the output of two algorithms proposes a novel hybrid rule detection model approach. Two benchmark datasets are used to evaluate the performance of the proposed approach in terms of detection accuracy and false-positive rate. The experimental results show that the proposed approach has a 99.96% accuracy and a 1.6% false-positive rate, outperforming other state-of-the-art DNS-based botnet detection approaches. PeerJ Inc. 2021-08-13 /pmc/articles/PMC8372004/ /pubmed/34458571 http://dx.doi.org/10.7717/peerj-cs.640 Text en © 2021 Al-mashhadi et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Data Mining and Machine Learning
Al-mashhadi, Saif
Anbar, Mohammed
Hasbullah, Iznan
Alamiedy, Taief Alaa
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic
title Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic
title_full Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic
title_fullStr Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic
title_full_unstemmed Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic
title_short Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic
title_sort hybrid rule-based botnet detection approach using machine learning for analysing dns traffic
topic Data Mining and Machine Learning
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8372004/
https://www.ncbi.nlm.nih.gov/pubmed/34458571
http://dx.doi.org/10.7717/peerj-cs.640
work_keys_str_mv AT almashhadisaif hybridrulebasedbotnetdetectionapproachusingmachinelearningforanalysingdnstraffic
AT anbarmohammed hybridrulebasedbotnetdetectionapproachusingmachinelearningforanalysingdnstraffic
AT hasbullahiznan hybridrulebasedbotnetdetectionapproachusingmachinelearningforanalysingdnstraffic
AT alamiedytaiefalaa hybridrulebasedbotnetdetectionapproachusingmachinelearningforanalysingdnstraffic