Skip to main content

Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis

  • Conference paper
  • First Online:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments (ISDDC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 10618))

Abstract

HTTP botnets are currently the most popular form of botnets compared to IRC and P2P botnets. This is because, they are not only easier to implement, operate, and maintain, but they can easily evade the detection. Likewise, HTTP botnets flows can easily be buried in the huge volume of legitimate HTTP traffic occurring in many organizations, which makes the detection harder. In this paper, a new detection framework involving three detection models is proposed, which can run independently or in tandem. The first detector profiles the individual applications based on their interactions, and isolates accordingly the malicious ones. The second detector tracks the regularity in the timing of the bot DNS queries, and uses this as basis for detection. The third detector analyzes the characteristics of the domain names involved in the DNS, and identifies the algorithmically generated and fast flux domains, which are staples of typical HTTP botnets. Several machine learning classifiers are investigated for each of the detectors. Experimental evaluation using public datasets and datasets collected in our testbed yield very encouraging performance results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Short life refers the time interval between two queries of the same domain.

    .

References

  1. Antonakakis, M., Perdisci, R., Dagon D., Lee W., Feamster, N.: Building a dynamic reputation system for DNS. In: The Proceedings of 19th USENIX Security Symposium (USENIX Security 2010) (2010)

    Google Scholar 

  2. Bilge, L., Sen, S., Balzarotti, D., Kirda, E., Kruegel, C.: Exposure: a passive DNS analysis service to detect and report malicious domains. ACM Trans. Inf. Syst. Secur. (TISSEC) 16(4), 14 (2014)

    Article  Google Scholar 

  3. Cai, T., Zou, F.: Detecting HTTP botnet with clustering network traffic. In: Proceedings of the 8th Conference Wireless Communications, Networking and Mobile Computing, pp. 1–7, September 2012

    Google Scholar 

  4. Chaware, S.P., Bhingarkar, S.: A survey of HTTP botnet detection. Int. Res. J. Eng. Technol. (IRJET) 3(1), 713–714 (2016)

    Google Scholar 

  5. da Luz, P.M.: Botnet detection using passive DNS. Master thesis, Department of Computing Science Radboud University Nijmegen (2013/2014)

    Google Scholar 

  6. Fedynyshyn, G., Chuah, M.C., Tan, G.: Detection and classification of different botnet C&C channels. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 228–242. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23496-5_17

    Chapter  Google Scholar 

  7. Garasia, S.S., Rana, D.P., Mehta, R.G.: HTTP botnet detection using frequent pattern set mining. Int. J. Eng. Sci. Adv. Technol. 2(3), 619–624 (2012)

    Google Scholar 

  8. Haddadi, F., Morgan, J., Filho, E.G., Zincir-Heywood, A.N.: Botnet behaviour analysis using IP Flows with HTTP filters using classifiers. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops, pp. 7–12 (2014)

    Google Scholar 

  9. Khillari, A., Augustine, A.: HTTP-based botnet detection technique using Apriori algorithm with actual time duration. Int. J. Comput. Eng. Appl. XI(III), 13–18 (2017)

    Google Scholar 

  10. Piscitello, D.: Monitor DNS Traffic & You Just Might Catch A RAT. Dark Reading, UBM Technology, 6 December 2014. http://www.darkreading.com/attacks-breaches/monitor-dns-traffic-and-you-just-might-catch-a-rat/a/d-id/1269593. Accessed 27 June 2017

  11. Nazario, J., Holz, T.: As the net churns: fast-flux botnet observations. In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008. IEEE, 7–8 October 2008. doi:10.1109/MALWARE.2008.4690854

  12. Sood, A.K., Zeadally, S., Enbody, R.J.: An empirical study of HTTP-based financial botnets. IEEE Trans. Dependable Secure Comput. 13, 236–251 (2016). doi:10.1109/TDSC.2014.2382590

    Article  Google Scholar 

  13. Tyagi, R., Paul, T., Manoj, B.S., Thanudas, B.: A novel HTTP botnet traffic detection method. In: IEEE INDICON (2015)

    Google Scholar 

  14. Tyagi, A.K., Nayeem, S.: Detecting HTTP botnet using Artificial Immune System (AIS). Int. J. Appl. Inf. Syst. (IJAIS) 2(6) (2012). ISSN: 2249-0868. Foundation of Computer Science FCS, New York, USA

    Google Scholar 

  15. Kirubavathi Venkatesh, G., Anitha Nadarajan, R.: HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 38–48. Springer, Heidelberg (2012). doi:10.1007/978-3-642-30955-7_5

    Google Scholar 

  16. Weimer, F.: Passive DNS replication. In: Proceedings of 1st Conference on Computer Security Incident, Singapore (2005)

    Google Scholar 

  17. Weymes, B.: DNS anomaly detection: defend against sophisticated malware, 28 May 2013. https://www.helpnetsecurity.com/2013/05/28/dns-anomaly-detection-defend-against-sophisticated-malware/. Accessed 28 June 2017

  18. Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Elsevier J. Comput. Secur. 39, 2–16 (2013)

    Article  Google Scholar 

  19. Zhao, D., Traore, I.: P2P botnet detection through malicious fast flux network identification. In: 7th International Conference on P2P, Parallel, Grid, Cloud, and Internet Computing - 3PGCIC 2012, 12–14 November 2012, Victoria, BC, Canada (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isaac Woungang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Alenazi, A., Traore, I., Ganame, K., Woungang, I. (2017). Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis. In: Traore, I., Woungang, I., Awad, A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science(), vol 10618. Springer, Cham. https://doi.org/10.1007/978-3-319-69155-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69155-8_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69154-1

  • Online ISBN: 978-3-319-69155-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics