Abstract

Botnet is most widespread and occurs commonly in today's cyber attacks and they become one of the most serious threats on the Internet. Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols and structures, and can become ineffective as Botnets change their structure and C&C techniques. In this paper, we proposed a new general detection strategy. This proposed strategy was based on degree distributions of node and anomaly net flows, and combined data mining technology. In this scheme, we first constructed accurate traffic profile based on packet behavioral mode, and then introduced dialog flow to draw traffic profile of node. Finally we set up degree distributions of node and group and applied the degree distributions of node as input of data mining, which were then classified and distinguished to obtain reliable results with acceptable accuracy. The advantages of our proposed detection method is that there is no need for prior knowledge of Botnets such as Botnet signature and the accuracy of the experiment results is as much as 99%. The FP rate and the FN rate can be controlled within 3%, the best is almost 0.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.