TY - GEN
T1 - Implementation and evaluation of bot detection scheme based on data transmission intervals
AU - Mizoguchi, Seiichiro
AU - Kugisaki, Yuji
AU - Kasahara, Yoshiaki
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2010
Y1 - 2010
N2 - Botnet is one of the most considerable issues in the world. A host infected with a bot is used for collecting personal information, launching DoS attacks, sending spam e-mail and so on. If such a machine exists in an organizational network, that organization will lose its reputation. We have to detect these bots existing in organizational networks immediately. Several network-based bot detection methods have been proposed; however, some traditional methods using payload analysis or signature-based detection scheme are undesirable in large amount of traffic. Also there is a privacy issue with looking into payloads, so we have to develop another scheme that is independent of payload analysis. In this paper, we propose a bot detection method which focuses on data transmission intervals. We distinguish human-operated clients and bots by their network behaviors. We assumed that a bot communicates with C&C server periodically and each interval of data transmission will be the same. We found that we can detect such behaviors by using clustering analysis to these intervals. We implemented our proposed algorithm and evaluated by testing normal IRC traffic and bot traffic captured in our campus network. We found that our method could detect IRC-based bots with low false positives.
AB - Botnet is one of the most considerable issues in the world. A host infected with a bot is used for collecting personal information, launching DoS attacks, sending spam e-mail and so on. If such a machine exists in an organizational network, that organization will lose its reputation. We have to detect these bots existing in organizational networks immediately. Several network-based bot detection methods have been proposed; however, some traditional methods using payload analysis or signature-based detection scheme are undesirable in large amount of traffic. Also there is a privacy issue with looking into payloads, so we have to develop another scheme that is independent of payload analysis. In this paper, we propose a bot detection method which focuses on data transmission intervals. We distinguish human-operated clients and bots by their network behaviors. We assumed that a bot communicates with C&C server periodically and each interval of data transmission will be the same. We found that we can detect such behaviors by using clustering analysis to these intervals. We implemented our proposed algorithm and evaluated by testing normal IRC traffic and bot traffic captured in our campus network. We found that our method could detect IRC-based bots with low false positives.
UR - http://www.scopus.com/inward/record.url?scp=79952064485&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952064485&partnerID=8YFLogxK
U2 - 10.1109/NPSEC.2010.5634446
DO - 10.1109/NPSEC.2010.5634446
M3 - Conference contribution
AN - SCOPUS:79952064485
SN - 9781424489152
T3 - 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010
SP - 73
EP - 78
BT - 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010
T2 - 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010
Y2 - 5 October 2010 through 5 October 2010
ER -