skip to main content
10.5555/1778902.1778912guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Botnet traffic detection techniques by C&C session classification using SVM

Published: 29 October 2007 Publication History

Abstract

Bots, which are new malignant programs are hard to detect by signature based pattern matching techniques.
In this research, we focused on a unique function of the bots the remote control channel (C&C session). We clarified that the C&C session has unique characteristics that come from the behavior of bot programs. Accordingly, we propose an alternative technique to identify computers compromised by the bot program for the classification of the C&C session from the traffic data using a machine learning algorithm support vector machine (SVM). Our evaluation resulted in 95% accuracy in the identification of the C&C session by using SVM. We evaluated that the packet histogram vector of the session is better than the other vector definitions for the classification of the bot C&C session.

References

[1]
Barford, P., Yagneswaran, V.: An Inside Look at Botnets. In: Special Workshop on Malware Detection, Advances in Information Security, Springer, Heidelberg (2006).
[2]
Nepenthes Development Team: http://nepenthes.mwcollect.org/stats:scannertest Available from http://nepenthes.mwcollect.org/stats:scannertest
[3]
M. Roesch: Snort: Lightweight intrusion detection for networks. In: 13th Systems Administration Conference (LISA'99), pp. 229-238. USENIX Associations (1999).
[4]
Binkley, J.R., Singh, S.: An Algorithm for Anomaly-based Botnet Detection. In: Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pp. 43-48 (July 2006).
[5]
Oikarinen, J., Reed, D.: Internet Relay Chat Protocol. RFC1459, Internet Engineering Task Force (1993).
[6]
Ramachandran, A., Feamster, N., Dagon, D.: Revealing Botnet Membership Using DNSBL Counter-Intelligence. In: Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pp. 49-54 (July 2006).
[7]
C.W. Hanna: Using Snort to Detect Rogue IRC Bot Programs. Technical report, (October 2004).
[8]
Livadas, C., Walsh, B., Lapsley, D., Strayer, T.: Using Machine Learning Techniques to identify botnet traffic. In: Proceedings of 2nd IEEE LCN Workshop on Network Security (November 2006).
[9]
Nepenthes Development Team: Nepenthes - Finest Collection. Available from http://nepenthes.mwcollect.org/
[10]
ClamAV project: ClamAV. Available from http://www.clamav.net/
[11]
VMware Inc.: VMware workstation. Software available at http://www.vmware.com/
[12]
Moore, A.W., Zuev, D.: Internet Traffic Classification using Bayesian Analysis Techniques. In: SIGMETRICS '05: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp. 50-60 (2005).
[13]
Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: SIGCOMM Comput. Commun. Rev. Number 36(2), 23-26 (2006).
[14]
Vapnik, V.N.: The Nature of Statistical Learning Theory. Springer, New York (1995).
[15]
Fix, E., Hodges, J.: Discriminatory analysis: Nonparametric Discrimination: Consistency Properties. Technical report 21-49-004, USAF School of Aviation Medicine (1951).
[16]
R Development Core Team: R: A Language and Environment for Statistical Computing. (2005) http://www.R-project.org ISBN 3-900051-07-0
[17]
Dimitriadou, E., Hornik, K., Leisch, F., Meyer, D., Weingessel, A.: A: The e1071 Package (2006), Available at http://cran.r-project.org/src/contrib/Descriptions/e1071.html
[18]
Chang, C.-C., Lin, C.-J.: LIBSVM: A library for support vector machines. Software (2001), available at http://www.csie.ntu.edu.tw/~cjlin/libsvm

Cited By

View all
  1. Botnet traffic detection techniques by C&C session classification using SVM

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      IWSEC'07: Proceedings of the Security 2nd international conference on Advances in information and computer security
      October 2007
      460 pages
      ISBN:3540756507
      • Editors:
      • Atsuko Miyaji,
      • Hiroaki Kikuchi,
      • Kai Rannenberg

      Sponsors

      • NICT: National Institute of Information and Communications Technology
      • Carnegie Mellon CyLab
      • ICF: International Communication Foundation

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 29 October 2007

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 27 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media