skip to main content
10.1145/2947626.2947634acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection

Authors Info & Claims
Published:20 July 2016Publication History

ABSTRACT

Botnets have become one of the most significant cyber threats over the last decade. The diffusion of the "Internet of Things" and its for-profit exploitation, contributed to botnets spread and sophistication, thus providing real, efficient and profitable criminal cyber-services. Recent research on botnet detection focuses on traffic pattern-based detection, and on analyzing the network traffic generated by the infected hosts, in order to find behavioral patterns independent from the specific payloads, architectures and protocols. In this paper we address the periodic behavioral patterns of infected hosts communicating with their Command-and-Control servers. The main novelty introduced is related to the traffic analysis in the frequency domain without using the well-known Fast Fourier Transform. Moreover, the mentioned analysis is performed through the exploitation of the proxy logs, easily deployable on almost every real-world scenario, from enterprise networks to mobile devices.

References

  1. G. Gu, J. Zhang, and W. Lee, "Botsniffer: Detecting botnet command and control channels in network traffic", in NDSS, 2008.Google ScholarGoogle Scholar
  2. Aditya K. Sood, Rohit Bansal, "Prosecting the Citadel botnet - revealing the dominance of the Zeus descendent", Kaspersky Virus Bulletin, September 2014;Google ScholarGoogle Scholar
  3. G. Gu et al., "Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection", in USENIX Security Symposium, 2008, pp. 139--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. AsSadhan B. et al. "Detecting botnets using command and control traffic", in Network Computing and Applications, 2009. NCA 2009. 8th IEEE International Symposium on. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. Tegeler et al., "BotFinder: finding bots in network traffic without deep packet inspection.", In Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (CoNEXT '12), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Tuhin, et al. "Fast-flux botnet detection from network traffic." India Conference (INDICON), 2014 Annual IEEE. IEEE, 2014.Google ScholarGoogle Scholar
  7. Kinjal S. Thaker, "Modelling and Detection of Camouflaging Worm at an Advance Level", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 10, October-2015, pp. 758--762.Google ScholarGoogle Scholar
  8. Soniya Balram and M. Wilscy, "User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection", International Journal of Network Security, Vol.16, No.1, Jan. 2014, pp.46--52.Google ScholarGoogle Scholar
  9. J. Kwon et al., "PsyBoG: Power spectral density analysis for detecting botnet groups", in Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Kwon et al., "PsyBoG: A scalable botnet detection method for large-scale DNS traffic", in Computer Networks 97 (2016), pp. 48--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Giuseppini, M. Burnett, J. Faircloth, D. Kleiman, "Microsoft Log Parser Toolkit: A complete toolkit for Microsoft's undocumented log analysis tool", ISBN-13: 978-1932266528. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Bottazzi, G. F. Italiano, "Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study", in Proceedings of the 3rd IEEE International Workshop on Cybercrimes and Emerging Web Environments, Liverpool, UK, October 2015.Google ScholarGoogle Scholar
  13. Kaspersky Security Bulletin 2014. Overall Statistics for 2014.Google ScholarGoogle Scholar
  14. OTX -- Alien Vault. https://otx.alienvault.com/indicator/ip/208.91.196.145/Google ScholarGoogle Scholar
  15. G. Bottazzi et al., "MP-Shield: A Framework for Phishing Detection in Mobile Devices", in Proceedings of the 3rd IEEE International Workshop on Cybercrimes and Emerging Web Environments, Liverpool, UK, October 2015.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SIN '16: Proceedings of the 9th International Conference on Security of Information and Networks
    July 2016
    186 pages
    ISBN:9781450347648
    DOI:10.1145/2947626

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 July 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper
    • Research
    • Refereed limited

    Acceptance Rates

    SIN '16 Paper Acceptance Rate12of46submissions,26%Overall Acceptance Rate102of289submissions,35%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader