Mining the Network Behavior of Bots
نویسندگان
چکیده
A botnet is a network of compromised hosts that fulfills the malicious intents of an attacker. Once installed, a bot is typically used to steal sensitive information, send SPAM, perform DDoS attacks, and other illegal activities. Research in botnet detection has been quite prolific in the past years, producing detection mechanisms that focus on specific command and control structures, or on the correlation between the activities of the bots and the communication patterns shared by multiple infected machines. We present an approach that aims to detect bot-infected hosts. Our approach ( i) is independent on the underlying botnet structure, ( ii) is able to detect individually infected hosts, ( iii) deals with encrypted communication, ( iv) does not rely on the presence of noisy malicious activities and can thus detect legitimate-resembling communication patterns, and ( v) has a low false positive rate. Our technique starts by monitoring a network trace produced by a bot sample B, which is summarized into a set of network flows. Similar flows are then grouped together by relying on a hierarchical clustering algorithm. The resulting clusters are analyzed for evidence of periodic behaviors. If no periodic behaviors are found, an output-based system selects those clusters that recur the most across different network traces obtained by running the sample B multiple times. Finally, our analysis automatically produces a network behavior model of B, which is deployed on a Bro NIDS sensor, that operates on real-time and realistic settings, raising few false positives.
منابع مشابه
Temporal Patterns in Bot Activities
Correlated or synchronized bots commonly exist in social media sites such as Twitter. Bots work towards gaining human followers, participating in campaigns, and engaging in unethical activities such as spamming and false click generation. In this paper, we perform temporal pattern mining on bot activities in Twitter. We discover motifs (repeating behavior), discords (anomalous behavior), joins,...
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملCharacterizing the Remote Control Behavior of Bots
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a "command-andcontrol" overlay network. We investigate observable differences in the behavior of bots and benign programs, focusing on the way that bots respond to data received over the network. Our experimental platform monitors program behavior, considering data received over the ...
متن کاملMeasurement and Classification of Humans and Bots in Internet Chat
The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat bots target popular chat networks to distribute spam and malware. In this paper, we first conduct a series of measurements on a large commercial chat network. Our measurements capture a total of 14 different types of chat bots ranging from simple to advanced. Moreover, we observe...
متن کاملCharacterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observable differences in the behavior of bots and benign programs, focusing on the way that bots respond to data received over the network. Our experimental platform monitors execution of an arbitrary Win32 binary, considering d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009