Botnet Detection Based on Behavioral Patterns using Netflow Records
سال انتشار: 1398
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 505
فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ITCT08_001
تاریخ نمایه سازی: 3 اردیبهشت 1399
چکیده مقاله:
Botnets are networks which are composed of compromised computers (called bots) with the aim of launching different kind of attacks such as DDoS, spamming and fishing. Most IDS/IPS systems use signature-based techniques to detect botnets in a network. However, botnets often can be identified by their footprints at network level, since they have specific behavioral patterns when they make connections to their command and control(C&C) servers. Furthermore, Detecting attacks at network level can be achieved using a shorter version of the traffic called Netflow which does not contain packet payloads providing more confidentiality and less storage overhead. In [S. García, HackLu 2014 at Luxemburg] a behavioral model was represented that accurately models botnet actions. In this paper, we utilize their behavioral features to train a more efficient and accurate model which does not have the intrinsic shortcomings of their suggested model. We also make their dataset balanced using a standard method which leads to even better results. The results have shown significant improvements over the previous method both in accuracy and efficiency. It is indicated that this method can be effectively used in production environments for detecting botnets.
کلیدواژه ها:
نویسندگان
Atieh Bakhshandeh
Afta Department Research Center for Development of Advanced Technologies Tehran, Iran