Cargando…
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication protocols. One of the widely used communicati...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8372004/ https://www.ncbi.nlm.nih.gov/pubmed/34458571 http://dx.doi.org/10.7717/peerj-cs.640 |
_version_ | 1783739751750172672 |
---|---|
author | Al-mashhadi, Saif Anbar, Mohammed Hasbullah, Iznan Alamiedy, Taief Alaa |
author_facet | Al-mashhadi, Saif Anbar, Mohammed Hasbullah, Iznan Alamiedy, Taief Alaa |
author_sort | Al-mashhadi, Saif |
collection | PubMed |
description | Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication protocols. One of the widely used communication protocols is the ‘Domain Name System’ (DNS) service, an essential Internet service. Bot-masters utilise Domain Generation Algorithms (DGA) and fast-flux techniques to avoid static blacklists and reverse engineering while remaining flexible. However, botnet’s DNS communication generates anomalous DNS traffic throughout the botnet life cycle, and such anomaly is considered an indicator of DNS-based botnets presence in the network. Despite several approaches proposed to detect botnets based on DNS traffic analysis; however, the problem still exists and is challenging due to several reasons, such as not considering significant features and rules that contribute to the detection of DNS-based botnet. Therefore, this paper examines the abnormality of DNS traffic during the botnet lifecycle to extract significant enriched features. These features are further analysed using two machine learning algorithms. The union of the output of two algorithms proposes a novel hybrid rule detection model approach. Two benchmark datasets are used to evaluate the performance of the proposed approach in terms of detection accuracy and false-positive rate. The experimental results show that the proposed approach has a 99.96% accuracy and a 1.6% false-positive rate, outperforming other state-of-the-art DNS-based botnet detection approaches. |
format | Online Article Text |
id | pubmed-8372004 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-83720042021-08-26 Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic Al-mashhadi, Saif Anbar, Mohammed Hasbullah, Iznan Alamiedy, Taief Alaa PeerJ Comput Sci Data Mining and Machine Learning Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication protocols. One of the widely used communication protocols is the ‘Domain Name System’ (DNS) service, an essential Internet service. Bot-masters utilise Domain Generation Algorithms (DGA) and fast-flux techniques to avoid static blacklists and reverse engineering while remaining flexible. However, botnet’s DNS communication generates anomalous DNS traffic throughout the botnet life cycle, and such anomaly is considered an indicator of DNS-based botnets presence in the network. Despite several approaches proposed to detect botnets based on DNS traffic analysis; however, the problem still exists and is challenging due to several reasons, such as not considering significant features and rules that contribute to the detection of DNS-based botnet. Therefore, this paper examines the abnormality of DNS traffic during the botnet lifecycle to extract significant enriched features. These features are further analysed using two machine learning algorithms. The union of the output of two algorithms proposes a novel hybrid rule detection model approach. Two benchmark datasets are used to evaluate the performance of the proposed approach in terms of detection accuracy and false-positive rate. The experimental results show that the proposed approach has a 99.96% accuracy and a 1.6% false-positive rate, outperforming other state-of-the-art DNS-based botnet detection approaches. PeerJ Inc. 2021-08-13 /pmc/articles/PMC8372004/ /pubmed/34458571 http://dx.doi.org/10.7717/peerj-cs.640 Text en © 2021 Al-mashhadi et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Data Mining and Machine Learning Al-mashhadi, Saif Anbar, Mohammed Hasbullah, Iznan Alamiedy, Taief Alaa Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic |
title | Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic |
title_full | Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic |
title_fullStr | Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic |
title_full_unstemmed | Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic |
title_short | Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic |
title_sort | hybrid rule-based botnet detection approach using machine learning for analysing dns traffic |
topic | Data Mining and Machine Learning |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8372004/ https://www.ncbi.nlm.nih.gov/pubmed/34458571 http://dx.doi.org/10.7717/peerj-cs.640 |
work_keys_str_mv | AT almashhadisaif hybridrulebasedbotnetdetectionapproachusingmachinelearningforanalysingdnstraffic AT anbarmohammed hybridrulebasedbotnetdetectionapproachusingmachinelearningforanalysingdnstraffic AT hasbullahiznan hybridrulebasedbotnetdetectionapproachusingmachinelearningforanalysingdnstraffic AT alamiedytaiefalaa hybridrulebasedbotnetdetectionapproachusingmachinelearningforanalysingdnstraffic |