Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection

Efficient bot detection is a crucial security matter and widely explored in the past years. Recent approaches supplant flow-based detection techniques and exploit graph-based features, incurring however in scalability issues, with high time and space complexity. Bots exhibit specific communication patterns: they use particular protocols, contact specific domains, hence can be identified by analyzing their communication with the outside. A way we follow to simplify the communication graph and avoid scalability issues is looking at frequency distributions of protocol attributes capturing the specificity of botnets behaviour. We propose a bot detection technique named BotFP, for BotFingerPrinting, which acts by (i) characterizing hosts behaviour with attribute frequency distribution signatures, (ii) learning benign hosts and bots behaviours through either clustering or supervised Machine Learning (ML), and (iii) classifying new hosts either as bots or benign ones, using distances to labelled clusters or relying on a ML algorithm. We validate BotFP on the CTU-13 dataset, which contains 13 scenarios of bot infections, connecting to a Command-and-Control (C&C) channel and launching malicious actions such as port scanning or Denial-of-Service (DDoS) attacks. Compared to state-of-the-art techniques, we show that BotFP is more lightweight, can handle large amounts of data, and shows better accuracy.

[1]  Gaurav Sharma,et al.  A Novel Approach for Efficient SVM Classification with Histogram Intersection Kernel , 2013, BMVC.

[2]  Martin Rehak,et al.  Identifying and modeling botnet C&C behaviors , 2014, ACySE '14.

[3]  Yoshua Bengio,et al.  Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..

[4]  Muhammad Sher,et al.  Flow-based intrusion detection: Techniques and challenges , 2017, Comput. Secur..

[5]  Raouf Boutaba,et al.  A comprehensive survey on machine learning for networking: evolution, applications and research opportunities , 2018, Journal of Internet Services and Applications.

[6]  Retantyo Wardoyo,et al.  Time Complexity Analysis of Support Vector Machines (SVM) in LibSVM , 2015 .

[7]  Yong Hou,et al.  SVM Based MLP Neural Network Algorithm and Application in Intrusion Detection , 2011, AICI.

[8]  Ashraf Matrawy,et al.  A Survey on Botnet Architectures, Detection and Defences , 2015, Int. J. Netw. Secur..

[9]  Maninder Singh,et al.  Detecting bot-infected machines using DNS fingerprinting , 2019, Digit. Investig..

[10]  landland Mid year update , 2014 .

[11]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[12]  Ahmed A. Abd El-Latif,et al.  Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario , 2020, IEEE Transactions on Network and Service Management.

[13]  Jing Wang,et al.  Botnet Detection Based on Anomaly and Community Detection , 2017, IEEE Transactions on Control of Network Systems.

[14]  Gürsel Serpen,et al.  Complexity Analysis of Multilayer Perceptron Neural Network Embedded into a Wireless Sensor Network , 2014, Complex Adaptive Systems.

[15]  Stefano Secci,et al.  BotFP: FingerPrints Clustering for Bot Detection , 2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium.

[16]  Guofei Gu,et al.  BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.

[17]  Radu State,et al.  SAFEM: Scalable analysis of flows with entropic measures and SVM , 2012, 2012 IEEE Network Operations and Management Symposium.

[18]  Alejandro Zunino,et al.  An empirical comparison of botnet detection methods , 2014, Comput. Secur..

[19]  Ming-Yang Su,et al.  A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach , 2009, Comput. Secur..

[20]  Ahmed A. Abd El-Latif,et al.  A Fully Automatic Player Detection Method Based on One-Class SVM , 2013, IEICE Trans. Inf. Syst..

[21]  Futai Zou,et al.  Detecting Malware Based on DNS Graph Mining , 2015, Int. J. Distributed Sens. Networks.

[22]  T. V. Lakshman,et al.  Unsupervised machine learning for network-centric anomaly detection in IoT , 2019, Big-DAMA@CoNEXT.

[23]  Radu State,et al.  BotGM: Unsupervised graph mining to detect botnets in traffic flows , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[24]  A. Nur Zincir-Heywood,et al.  Exploring a service-based normal behaviour profiling system for botnet detection , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[25]  Raouf Boutaba,et al.  A Graph-Based Machine Learning Approach for Bot Detection , 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[26]  Xiuli Shao,et al.  Detecting P2P botnets by discovering flow dependency in C&C traffic , 2014, Peer-to-Peer Netw. Appl..

[27]  Mohammad Marufuzzaman,et al.  Botnet detection using graph-based feature clustering , 2017, Journal of Big Data.

[28]  Mark Crovella,et al.  Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.

[29]  Jalal Al-Muhtadi,et al.  Analysis of P2P, IRC and HTTP traffic for botnets detection , 2018, Peer-to-Peer Netw. Appl..

[30]  Wei Lu,et al.  Detecting Network Anomalies Using CUSUM and EM Clustering , 2009, ISICA.

[31]  Kunle Olukotun,et al.  Map-Reduce for Machine Learning on Multicore , 2006, NIPS.

[32]  Marco Mellia,et al.  A Survey on Big Data for Network Traffic Monitoring and Analysis , 2019, IEEE Transactions on Network and Service Management.

[33]  Vinod Yegneswaran,et al.  BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.

[34]  Prateek Mittal,et al.  BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.