BOTNET BEHAVIOR ANALYSIS USING NAÏVE BAYES CLASSIFICATION ALGORITHM WITHOUT DEEP PACKET INSPECTION

Size: px
Start display at page:

Download "BOTNET BEHAVIOR ANALYSIS USING NAÏVE BAYES CLASSIFICATION ALGORITHM WITHOUT DEEP PACKET INSPECTION"

Transcription

1 International Journal of Computer Engineering and Applications, Volume IX, Issue VIII, August ISSN BOTNET BEHAVIOR ANALYSIS USING NAÏVE BAYES CLASSIFICATION ALGORITHM WITHOUT DEEP PACKET INSPECTION Sushil Buriya, Dr. D.S. Bhilare, Amreesh Kumar Patel and Satyendra Singh Yadav School of Computer Science & IT, DAVV, Indore, M.P., India ABSTRACT: Botnet is one of the most dangerous cyber security issues among the diverse forms of cyber threats. They are used to commit various kind of cyber crime like click fraud, personal information stealing, Distributed Denial of Service attack, sending spam etc. Cloud Services provide a new platform to launch botnet attacks due to their high reliability and scalability. Botnet detection techniques that operate on network traffic require deep packet inspection for signature matching. Adoption of these techniques for cloud based botnets is undesirable due to large amount of network traffic. Also it is a privacy issue with analysis of payloads for Cloud Service Providers. In this paper, we present the performance analysis of a supervised machine learning algorithm Naïve Bayes Classifier to detect botnet activity using C&C NetFlow traffic between bots with different possible feature without deep packet inspection of network traffic. Keywords: Cyber Attacks, Network Security, NetFlow, Classification, Botnet, Botnet Behavior Analysis [1] INTRODUCTION Botnet is a large collection of compromised computer systems connected over internet that works in a cluster to perform harmful activity on another network or computer system with malicious intent [1]. These compromised or infected machines called bots are controlled by an attacker who known as botmaster [2]. Botmasters commit criminal activity like denial of service attacks, spam, espionage, click fraud, and phishing more effectively by using the army of controlled and compromised bots for financial gains. Botnet attacks are highly dynamic, stealth and fast [3]. Botnet is the most dangerous cyber security issues among the diverse forms of cyber threats. Emergence of cloud computing technology provide a platform for botmasters to deploy botnet on large scale with immediate effects and a powerful bot army to perform attacks on other networks [4]. Various automated botnet detection methods have been proposed. Botnet detection has difficulties in three categories. 1.) Botnet traffic is similar to normal traffic and it may be encrypted. 2.) Botmasters use fast-flux hosting to hide origins and stay active for longer. 3.) Botnet techniques requires large amount of data for analysis [5]. Sushil Buriya, Dr. D.S. Bhilare, Amreesh Kumar Patel and Satyendra Singh Yadav 45

2 BOTNET BEHAVIOR ANALYSIS USING NAÏVE BAYES CLASSIFICATION ALGORITHM WITHOUT DEEP PACKET INSPECTION Command and Control channels differentiate botnets from onther malwares. Command and Control channels are used by botmaster to command bots to execute attack activities. C&C communications are only traffic transfers between members of bots before they attack their victim. C&C traffic is helpful to detect member of botnets before they cause any malicious activity [6]. NetFlow data related to C&C channels can be a valuable resource for detecting member of bot family without inspecting the payloads. NetFlow is a traffic summary technology by cisco systems. NetFlow uses the limited footprints in terms of monitoring requirements and processing [7]. Today, many botnet detection methods have been proposed. Most of the methods are reactive methods. Reactive methods detect the botnet while attack is on progress through botnet. One prominent class of botnet detection relies on machine learning algorithms as a mean of identifying suspicious traffic. Main assumption behind these approaches is the distinguishable patterns created by botnets in network traffic. Learning implies ability to train the system according to the previous data and recognize complex patterns to make qualified decisions [8]. Naïve Bayes classification is a machine learning algorithm based on supervised learning approach. Naïve bayes classification is based on the conditional probability theorem known as baye theorem [9]. In this paper we present the performance analysis of Naïve bayes classifier for analysis of C&C NetFlow generated by member of botnets for different possible features of NetFlow data and indentify the best possible set of features that gives the efficient performance in terms of CPU run time and correctness of results. The rest of the paper is organized as follows. In the next section background studies related to machine learning approaches for botnet detection are presented. In section 3 design of NetFlow Traffic Analyzer is described. Section 4 will demonstrates the experiments performed and section 5 discusses the results. Finally, we conclude this paper in section 6. [2] LITERATURE REVIEW The first workshop about Botnets was held in 2007 and since then various detection approaches have been proposed and also some real botnet detection systems have been implemented. Botnet detection is a really challenging problem [3]. Machine learning algorithm techniques for botnet detection are the most prominent approaches for botnet detection [10]. The assumption behind the machine learning approaches is that botnet creates a distinguishable pattern that could be discovered by Machine Learning Algorithms [11]. Strayer et al. have demonstrated the use of supervised machine learning algorithms for identifying botnet traffic. The classification of TCP flows using supervised MLAs plays a key role. For the classification of network traffic flows, three MLAs: Naive Bayesian, Bayesian network and C4.5 decision tree are providing relatively low false positive and false negative rates (under 3%). The main disadvantage of the approach is the fact that it is only for TCP traffic [12]. Florian Tegeler et al. presented a system BotFinder that detects infected hosts in a network using high-level properties of the botnet traffic without content analysis. It uses machine learning to identify the key features of C&C communication. It extracts five statistical features from NetFlow traces and creates a model using clustering algorithm for known botnet dataset. 46

3 International Journal of Computer Engineering and Applications, Volume IX, Issue VIII, August ISSN The models are used to detect the infected hosts in actual detection phase. It works without deep inspection of packets, so it has capability to investigate encrypted traffic also. If a botmaster uses randomization techniques for C&C communication, it degrades the detection quality of BotFinder. Another limitation of BotFinder is high fluctuation of C&C servers IPs, it also degrade the detection quality of BotFinder [13]. Disclosure is a large scale, wide area botnet detection system that uses NetFlow data to detect the C&C servers of botnet. It reliably distinguishes C&C channels from actual traffic using NetFlow records: (i) flow sizes, (ii) client access patterns, and (iii) temporal behavior. It uses random forest classifier algorithm to build detection models. Authors demonstrate that Disclosure is able to perform real-time detection of botnet C&C channels over data sets on the order of billions of flows per day. Randomization in communication patterns of bots with C&C servers degrades the performance of Disclosure [14]. Fariba Haddadi et al. employed two machine learning algorithms, namely C4.5 decision tree and symbolic bid-based (SBB), to generate botnet detection automatically. Two different feature sets are analyzed to check the performance of both machine learning algorithms for different botnet behaviors. Result of analysis describes that SBB performed better than C4.5 in term of the solution complexity [15]. Sherif Saad et al. propose an approach for characterizing and detecting using network traffic behaviors. The approach focus on P2P bots during C&C phases (Waiting). Authors extract and analyze a set of features using five machine learning techniques, namely, Support Vector Machine (SVM), Artificial Neural Network (ANN), Nearest Neighbors Classifier (NNC), Gaussian Based Classifier (GBC), and Naïve Based Classifier (NBC). 17 features that can be extracted from network flows and host communication patterns analyzed using 5 machine learning techniques. Four metrics are used to evaluate each machine learning techniques. The SVM, ANN, and NNC are top three machine learning techniques that can be used to build a botnet detection framework. None of these techniques satisfy the requirement of online botnet detection framework [16]. Matija Stevanovic et al. explores in their study how accurate and timely detection can be achieved by supervised machine learning algorithms of botnet from network flow data. 17 netflow feature attributes are used to detect botnet in network traffic by analyzing traffic using eight supervised machine learning algorithms [17]. In this paper we aim to reduce the statistical features for identification of botnet activity in network traffic using Naïve Baise classification algorithm with high rate of accuracy. [3] NETWORK TRAFFIC ANALYZER In order to identify botnet activity in network we propose a Network Traffic Analyzer that classifies NetFlow traffic as botnet traffic flow or normal traffic flow using supervised learning Naïve Bayes classification algorithm, illustrated in [Figure-1]. The NetFlow Traffic Analyzer has two phases: First is training phase that uses the previously known training NetFlow data to prepare a model. Second is the actual detection phase that utilizes the model prepared in training phase to investigate the NetFlow data to detect C&C channels patterns in netflow traffic. The Model has following components: Sushil Buriya, Dr. D.S. Bhilare, Amreesh Kumar Patel and Satyendra Singh Yadav 47

4 BOTNET BEHAVIOR ANALYSIS USING NAÏVE BAYES CLASSIFICATION ALGORITHM WITHOUT DEEP PACKET INSPECTION (i.) Traffic Collector: The traffic collector receives NetFlow data or captured data from probes which are responsible for capturing the packets. A NetFlow collector accepts traffic from router via UDP or TCP ports. Figure: 1. Network Traffic Analyzer Achitecture (ii.) Flow Reassembly: Netflow data can be used directly, but in case of packet captured data, we have to reassemble network flow. (iii.) Feature Extraction: This Module is responsible for features extraction from NetFlow data. The first class of features have been extracted from NetFlow data are based on flow sizes, which simply indicate the total number of bytes transferred in one direction between two endpoints for a particular flow. Flow size distributions of C&C servers are significantly different from benign servers because flows carrying botnet commands are preferred to be as short as possible in order to minimize their observable impact on network. Other important features are number of packets in each flow and duration of connection between two machines for that flow of network traffic. A NetFlow data have statistical measures. These are source and destination address, source and destination port numbers, duration of flow, size of flow, number of packets in each flow, protocol of communication etc. This module of model checks the results for different feature sets and return the feature set that has maximum accuracy and low run time for particular bot family. (iv.) Feature Analysis: After feature extraction, this module uses data classification algorithm to prepare model in training phase and detect the C&C traffic of botnet in detection phase. Naïve Bayes Classifier is used to classify the NetFlow data to detect botcloud. Simple Naïve Bayes Classifier is based on probability theory [9]. It is based on Bayesian theorm. It is best suited when the dimensionality of the inputs is high. It requires a small amount of training data for parameter estimation. Algorithm is shown in [Figure-2]. 48

5 International Journal of Computer Engineering and Applications, Volume IX, Issue VIII, August ISSN Learning Phase: Given a training dataset S = {D1,D2,,Dn} 1. For each class Ci = {C1,C2,,Ck} Calculate prior probability P(Ci) Store in prior probability table 2. For each class Ci = {C1,C2,,Ck} For each dataset Dj = {D1,D2,,Dn} Calculate conditional probability P(Dj/Ci) Store in conditional probability table Test Phase: Given a Testing dataset T = { D1,D2,,Dn} 1. Lookup prior and conditional probability tables 2. For each class Ci = {C1,C2,,Ck} For each dataset Dj = {D1,D2,,Dn} Calculate Prob = P(Dj/Ci)* P(Ci) Figure: 2. Naïve Bayes Algorithm [4] EXPERIMENTS Data has been downloaded from the CTU-13 dataset [18]. The CTU-13 is a dataset of botnet traffic that was captured in the CTU University, Czech Republic, in The advantage of using this dataset is that it is labeled dataset and capturing process conducted in controlled environment. The dataset consist different botnet sample data to have capture of normal traffic mixed with botnet traffic. These datasets are labeled netflow traffic data. Each flow has 14 attributes as shown in [Figure-3]. The dataset is divided into four text files with different sizes according to number of flows in each file. Figure: 3. Snapshot of Sample Dataset for Experiment Dataset is sampled into three text files with different number of instances and performed 4 experiment random trials on these 3 sample datasets. One sample dataset is used as a training data for classification model preparation and another is used as a testing dataset to test the performance of the model. [Table-1] represents the details of sample datasets for each experiment trial. Sushil Buriya, Dr. D.S. Bhilare, Amreesh Kumar Patel and Satyendra Singh Yadav 49

6 BOTNET BEHAVIOR ANALYSIS USING NAÏVE BAYES CLASSIFICATION ALGORITHM WITHOUT DEEP PACKET INSPECTION Table: 1. Sample Datasets for Experiment Name No. of Instances Class-I Class-II No. of Total Attributes Sample1.txt Normal Flow Sample2.txt Normal Flow Sample3.txt Normal Flow Botnet Activity Botnet Activity Botnet Activity In this experiment, 14 attributes are divided into 10 feature sets that may give the best results according to running time and accuracy. There are two basic parameters for performance analysis of traffic analyzer. One is the running time and another is accuracy. 10 different feature sets are analyzed using Naïve Bayes Classification algorithm that has been implemented using python scripting language. Different feature sets with attribute values are shown in [Table-2]. Table: 2. Different Feature Sets and their attributes Feature Set-1 (FS1) Feature Set-2 (FS2) Feature Set-3 (FS3) Feature Set-4 (FS4) Feature Set-5 (FS5) Feature Set-6 (FS6) Feature Set-7 (FS7) Feature Set-8 (FS8) Feature Set-9 (FS9) Feature Set-10 (FS10) Flow Duration, Flow Size, Protocol Flow Duration, Flow Size Flow Duration, Flow Size, No. Of Packets/Flow Flow Size, Protocol, No. Of Packets/Flow Flow Duration, Flow Size, Protocol, No. Of Packets/Flow Flow Duration, Flow Size, No. Of Packets/Flow, Source IP Flow Duration, Flow Size, Protocol, No. of Packets/Flow, Source IP Flow Size, No. Of Packets/Flow, Source IP Flow Duration, Protocol, No. Of Packets/Flow Flow Size, Protocol, No. Of Packets/Flow [5] RESULTS & DISCUSSIONS We use python to implement Naïve Bayes Classifier that prepares a classification model using one sample dataset as training data and test another sample dataset. In each experiment trial, program returns an accuracy of test dataset by comparing the estimated class label with actual class label. Accuracy is the ratio of correctly estimated instances with total number of instance in test dataset. [Table-3] shows the results of 4 trials in experiment for 10 feature sets. 50

7 International Journal of Computer Engineering and Applications, Volume IX, Issue VIII, August ISSN Table: 3. Experiment Results for accuracy Feature Set Trial-1 Trial-2 Trial-3 Trial-4 Average FS % 98.77% 98.88% 98.80% 98.81% FS % 98.77% 98.88% 98.80% 98.81% FS % 98.77% 98.87% 98.80% 98.81% FS % 98.79% 98.95% 98.82% 98.84% FS % 98.77% 98.88% 98.80% 98.81% FS % 97.04% 97.03% 97.45% 97.24% FS % 97.04% 97.03% 97.45% 97.24% FS % 97.05% 97.03% 97.47% 97.25% FS % 97.04% 96.86% 97.18% 97.13% FS % 98.77% 98.85% 98.79% 98.80% Observation FS4 has highest value of accuracy and FS1, FS2, FS3 and FS5 have almost same performance. FS6 and FS7 gives exactly same performance. Graph for average of accuracy of feature sets in experiment trials is displayed in [Figure-5]. Grapth displayed in [Figure-4] shows comparative performance of 4 trial for experiment. Figure: 4. Comparative Performance of 4 trials Result: Experiment has been performed successfully. Results from 4 trials shows that Feature Set 4 has highest accuracy in overall experiment. Attributes of feature set 4 are Flow Size, Protocol and Number of Packets/Flow. Experiment shows running time of traffic analyzer increases when number of attributes increases. Outcomes of experiment support that netflow traffic of C&C channels have potential to identify botnets using the Naïve Bayes Classifier with 3 attributes values flow size, number of packets per flow and protocol of communication without inspection of packet data. Sushil Buriya, Dr. D.S. Bhilare, Amreesh Kumar Patel and Satyendra Singh Yadav 51

8 BOTNET BEHAVIOR ANALYSIS USING NAÏVE BAYES CLASSIFICATION ALGORITHM WITHOUT DEEP PACKET INSPECTION Figure: 5. Average Accuracy Graph [6] CONCLUSION Botnet is the most dangerous cyber security issues among the diverse forms of cyber threats. Various automated botnet detection methods have been proposed. Botnet detection techniques that operate on network traffic require deep packet inspection for signature matching. Adoption of these techniques for cloud based botnets is undesirable due to large amount of network traffic. NetFlow data related to C&C channels can be a valuable resource for detecting member of bot family without inspecting the payloads. One prominent class of botnet detection relies on machine learning algorithms as a mean of identifying suspicious traffic. In this paper, Naïve Bayes classifier is used to analyze the netflow traffic to recognize unknown malicious patterns related to botnet C&C communication or botnet activity in netflow traffic of a network. It is identified that flow size, number of packets per flow and communication protocol are three attributes that differentiate botnet C&C traffic from other network traffic in netflow traffic. We have performed experiments using a supervised machine learning algorithm, Naïve Bayes Classifier to detect botnet activity using C&C NetFlow traffic between bots with 14 possible features attributes of netflow data. Outcomes of experiment support that netflow traffic of C&C channels have potential to identify botnets using the Naïve Bayes Classifier with 3 attributes values flow size, number of packets per flow and protocol of communication without inspection of packet data. REFERENCES [1] B. Saha and A, Gairola, Botnet: An overview, CERT-In White PaperCIWP , [2] Gianluca Stringhini et al., The Har vester, the Botmaster, and the Spammer: On the Relations between the Different Actors in the Spam Landscape, in ASIA CCS 14, June 4 6, 2014, Kyoto, Japan. 52

9 International Journal of Computer Engineering and Applications, Volume IX, Issue VIII, August ISSN [3] Hossein Rouhan Zeidanloo et al., A Taxonomy of Botnet Detection Techniques in 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Volume: 2, [4] Wenjie Lin and David Lee, Traceback Attacks in Cloud Pebbletrace Botnet, in 32nd International Conference on Distributed Computing Systems, pp: , June 18-21, 2012 [5] Hyunsang Choi et al., BotGAD: Detecting Botnets by Capturing Group Activities in Network Traffic, in COMSWARE, Dublin, Ireland, [6] Basil AsSadhan et al., Detecting Botnets using Command and Control Traffic, in Eighth IEEE International Symposium on Network Computing and Applications, MA, USA,2009. [7] David Mashburn, NetFlow collection and analysis using nfcapd, Python, and Splunk in the SANS Institute Reading Room, [8] Livadas C. et al. Usilng Machine Learning Technliques to Identify Botnet Traffic in 31st IEEE Conference on Local Computer Networks, Tampa, FL, [9] [10] S. S. Silva, R. M. Silva, R. C. Pinto, and R. M. Salles, Botnets: A survey, Computer Networks, vol. 57, no. 2, pp , [11] M. Stevanovic and J. Pedersen, Machine learning for identifying botnet network traffic, Aalborg University, Tech. Rep., [12] W. T. Strayer, D. Lapsely, R. Walsh, and C. Livadas, Botnet detection based on network behaviour, in Botnet Detection, ser. Advances in Information Security, W. Lee, C. Wang, and D. Dagon, Eds. Springer, 2008, vol. 36, pp [13] Florian Tegeler et al., BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection, in Co-NEXT 12, December 10-13, 2012, Nice, France. [14] Leyla Bilge et al., DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis, in ACSAC 12 Dec. 3-7, 2012, Orlando, Florida, USA. [15] Fariba Haddadi et al., On Botnet Behavior Analysis using GP and C4.5, in GECCO 14, July 12 16, Vancouver, BC, Canada, [16] Sherif Saad et al., Detecting P2P Botnets through Network Behavior Analysis and Machine Learning, in Ninth Annual International Conference on Privacy, Security and Trust, Montreal, QC, Canada, [17] Matija Stevanovic et al. An efficient flow-based botnet detection using supervised machine learning, in ICNC-2014, Honolulu, HI, [18] Sebastian Garcia, Martin Grill, Honza Stiborek and Alejandro Zunino, "An empirical comparison of botnet detection methods" in Computers and Security Journal, Elsevier,Vol 45, pp , Sushil Buriya, Dr. D.S. Bhilare, Amreesh Kumar Patel and Satyendra Singh Yadav 53

10 BOTNET BEHAVIOR ANALYSIS USING NAÏVE BAYES CLASSIFICATION ALGORITHM WITHOUT DEEP PACKET INSPECTION Author[s] brief Introduction 1. Sushil Buriya M.Tech. Student, School of Computer Science &IT, DAVV, Indore 2. Dr. D.S. Bhilare Professor, School of Computer Science & IT, DAVV, Indore 3. Amreesh Kumar Patel M.Tech. Student, School of Computer Science &IT, DAVV, Indore 4. Satyendra Singh Yadav M.Tech. Student, School of Computer Science &IT, DAVV, Indore 54

Detecting Botnets Using Cisco NetFlow Protocol

Detecting Botnets Using Cisco NetFlow Protocol Detecting Botnets Using Cisco NetFlow Protocol Royce Clarenz C. Ocampo 1, *, and Gregory G. Cu 2 1 Computer Technology Department, College of Computer Studies, De La Salle University, Manila 2 Software

More information

Botnets Behavioral Patterns in the Network

Botnets Behavioral Patterns in the Network Botnets Behavioral Patterns in the Network Garcia Sebastian @eldracote Hack.Lu 2014 CTU University, Czech Republic. UNICEN University, Argentina. October 23, 2014 How are we detecting malware and botnets?

More information

Botnet Behaviour Analysis using IP Flows

Botnet Behaviour Analysis using IP Flows 2014 28th International Conference on Advanced Information Networking and Applications Workshops Botnet Behaviour Analysis using IP Flows With HTTP filters using classifiers Fariba Haddadi, Jillian Morgan,

More information

P2P Botnet Detection Based on Traffic Behavior Analysis and Classification

P2P Botnet Detection Based on Traffic Behavior Analysis and Classification Int. J. of Comp. & Info. Tech., (2018) 6(1): 01-12 ISBN: 2345-3877 www.ijocit.org Volume 6, Issue 1 Original Research_ P2P Botnet Detection Based on Traffic Behavior Analysis and Classification Hojjat

More information

International Journal of Computer Trends and Technology (IJCTT) Volume54 Issue 1- December 2017

International Journal of Computer Trends and Technology (IJCTT) Volume54 Issue 1- December 2017 A Reliable & Scalable Frame Work for HTTP BotNet Detection Dr.R.Kannan, Associate Professor, Department of Computerscience,Sri Ramakrishna Mission Vidyalaya College of arts and science Mrs.Poongodi Department

More information

Traceback Attacks in Cloud Pebbletrace Botnet nd International Conference on Distributed Computing Systems Workshops Wenjie Lin, David Lee

Traceback Attacks in Cloud Pebbletrace Botnet nd International Conference on Distributed Computing Systems Workshops Wenjie Lin, David Lee Traceback Attacks in Cloud Pebbletrace Botnet 2012 32nd International Conference on Distributed Computing Systems Workshops Wenjie Lin, David Lee Outline Introduction Key Identification Botnet attack in

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016 Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds

More information

Detecting Malicious Hosts Using Traffic Flows

Detecting Malicious Hosts Using Traffic Flows Detecting Malicious Hosts Using Traffic Flows Miguel Pupo Correia joint work with Luís Sacramento NavTalks, Lisboa, June 2017 Motivation Approach Evaluation Conclusion Outline 2 1 Outline Motivation Approach

More information

HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION

HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, www.ijcea.com ISSN 2321-3469 HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME

More information

Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification

Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification Fariba Haddadi and A. Nur Zincir-Heywood Faculty of Computer Science Dalhousie University Halifax, NS, Canada

More information

Detection of HTTP based Botnets With Network Analyzers using Classifiers and Domain Name Filters

Detection of HTTP based Botnets With Network Analyzers using Classifiers and Domain Name Filters Detection of HTTP based Botnets With Network Analyzers using Classifiers and Domain Name Filters Ravi Kumar Reddy K [1], Anantha Krishna V [2], Dr Anitha J [3] [1,3] Dept. of Computer Science and [2] Dept.

More information

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts 2014 7th International Symposium on Telecommunications (IST'2014) BotCatch: Botnet Based on Coordinated Group Activities of Compromised Hosts Mosa Yahyazadeh and Mahdi Abadi Faculty of Electrical and Computer

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

Citation for published version (APA): Stevanovic, M., & Pedersen, J. M. (2013). Machine learning for identifying botnet network traffic.

Citation for published version (APA): Stevanovic, M., & Pedersen, J. M. (2013). Machine learning for identifying botnet network traffic. Aalborg Universitet Machine learning for identifying botnet network traffic Stevanovic, Matija; Pedersen, Jens Myrup Publication date: 2013 Document Version Accepted author manuscript, peer reviewed version

More information

P2P Botnet Detection Method Based on Data Flow. Wang Jiajia 1, a Chen Yu1,b

P2P Botnet Detection Method Based on Data Flow. Wang Jiajia 1, a Chen Yu1,b 2nd International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE 2017) P2P Botnet Detection Method Based on Data Flow Wang Jiajia 1, a Chen Yu1,b 1 Taizhou Pylotechnic

More information

Intrusion Detection System using AI and Machine Learning Algorithm

Intrusion Detection System using AI and Machine Learning Algorithm Intrusion Detection System using AI and Machine Learning Algorithm Syam Akhil Repalle 1, Venkata Ratnam Kolluru 2 1 Student, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Educational

More information

Detecting P2P Botnets through Network Behavior Analysis and Machine Learning

Detecting P2P Botnets through Network Behavior Analysis and Machine Learning Detecting P2P Botnets through Network Behavior Analysis and Machine Learning Sherif Saad Email: shsaad@ece.uvic.ca Bassam Sayed Email: bassam@ece.uvic.ca Issa Traore Email: itraore@ece.uvic.ca David Zhao

More information

Detecting bots using multilevel traffic analysis

Detecting bots using multilevel traffic analysis Intl. Journal on Cyber Situational Awareness, Vol. 1, No. 1, 2016 Detecting bots using multilevel traffic analysis Matija Stevanovic and Jens Myrup Pedersen Department of Electronic Systems, Aalborg University

More information

Detecting malware even when it is encrypted

Detecting malware even when it is encrypted Detecting malware even when it is encrypted Machine Learning for network HTTPS analysis František Střasák strasfra@fel.cvut.cz @FrenkyStrasak Sebastian Garcia sebastian.garcia@agents.fel.cvut.cz @eldracote

More information

Detecting P2P Botnets through Network Behavior Analysis and Machine Learning

Detecting P2P Botnets through Network Behavior Analysis and Machine Learning 211 Ninth Annual International Conference on Privacy, Security and Trust Detecting P2P Botnets through Network Behavior Analysis and Machine Learning Sherif Saad Email: shsaad@ece.uvic.ca Issa Traore Email:

More information

Behavior Based Malware Analysis: A Perspective From Network Traces and Program Run-Time Structure

Behavior Based Malware Analysis: A Perspective From Network Traces and Program Run-Time Structure Behavior Based Malware Analysis: A Perspective From Network Traces and Program Run-Time Structure Chun-Ying Huang chuang@ntou.edu.tw Assistant Professor Department of Computer Science and Engineering National

More information

Security Gap Analysis: Aggregrated Results

Security Gap Analysis: Aggregrated Results Email Security Gap Analysis: Aggregrated Results Average rates at which enterprise email security systems miss spam, phishing and malware attachments November 2017 www.cyren.com 1 Email Security Gap Analysis:

More information

Data Confirmation for Botnet Traffic Analysis

Data Confirmation for Botnet Traffic Analysis Data Confirmation for Botnet Traffic Analysis Fariba Haddadi and A. Nur Zincir-Heywood Faculty of Computer Science Dalhousie University Halifax, NS, Canada Email: {haddadi, zincir}@cs.dal.ca Abstract In

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

A New Logging-based IP Traceback Approach using Data Mining Techniques

A New Logging-based IP Traceback Approach using Data Mining Techniques using Data Mining Techniques Internet & Multimedia Engineering, Konkuk University, Seoul, Republic of Korea hsriverv@gmail.com, kimsr@konuk.ac.kr Abstract IP Traceback is a way to search for sources of

More information

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information

More information

Internet Traffic Classification using Machine Learning

Internet Traffic Classification using Machine Learning Internet Traffic Classification using Machine Learning by Alina Lapina 2018, UiO, INF5050 Alina Lapina, Master student at IFI, Full stack developer at Ciber Experis 2 Based on Thuy T. T. Nguyen, Grenville

More information

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University

More information

From Signature-Based Towards Behaviour-Based Anomaly Detection (Extended Abstract)

From Signature-Based Towards Behaviour-Based Anomaly Detection (Extended Abstract) From Signature-Based Towards Behaviour-Based Anomaly Detection (Extended Abstract) Pavel Minarik, Jan Vykopal Masaryk University CZECH REPUBLIC minarik@ics.muni.cz / vykopal@ics.muni.cz INTRODUCTION It

More information

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,

More information

Detecting Spam Zombies By Monitoring Outgoing Messages

Detecting Spam Zombies By Monitoring Outgoing Messages International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.71-75 Detecting Spam Zombies By Monitoring Outgoing Messages

More information

Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics

Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 Vol. 6, No. 2, June 2017, pp. 140~148, DOI: 10.11591/eei.v6i2.605 140 Review of Detection DDOS Attack Detection Using Naive Bayes Classifier

More information

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

BotDigger: A Fuzzy Inference System for Botnet Detection

BotDigger: A Fuzzy Inference System for Botnet Detection The Fifth International Conference on Internet Monitoring and Protection BotDigger: A Fuzzy Inference System for Botnet Detection Basheer Al-Duwairi Network Engineering and Security Department Jordan University

More information

Stochastic Blockmodels as an unsupervised approach to detect botnet infected clusters in networked data

Stochastic Blockmodels as an unsupervised approach to detect botnet infected clusters in networked data Stochastic Blockmodels as an unsupervised approach to detect botnet infected clusters in networked data Mark Patrick Roeling & Geoff Nicholls Department of Statistics University of Oxford Data Science

More information

Application of Revised Ant Colony Optimization for Anomaly Detection Systems

Application of Revised Ant Colony Optimization for Anomaly Detection Systems Application of Revised Ant Colony Optimization for Anomaly Detection Systems Chia-Mei Chen1*, Wen-Ling Lo2, Ya-Hui Ou3, Gu-Hsin Lai3, Tse-Yao Wang3 1 Department of Information Management National Sun Yat-Sen

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions IPS Effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of defense that helps you protect

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

Hidden Figures: Securing what you cannot see

Hidden Figures: Securing what you cannot see Hidden Figures: Securing what you cannot see TK Keanini, Distinguished Engineer Stealthwatch, Advanced Threat Solutions CID-0006 Hello My Name is TK Keanini Keanini (Pronounced Kay-Ah-Nee-Nee) TK: The

More information

The evolution of malevolence

The evolution of malevolence Detection of spam hosts and spam bots using network traffic modeling Anestis Karasaridis Willa K. Ehrlich, Danielle Liu, David Hoeflin 4/27/2010. All rights reserved. AT&T and the AT&T logo are trademarks

More information

COUNTERMEASURE SELECTION FOR VIRTUAL NETWORK SYSTEMS USING NETWORK INTRUSION DETECTION

COUNTERMEASURE SELECTION FOR VIRTUAL NETWORK SYSTEMS USING NETWORK INTRUSION DETECTION International Journal of Computer Engineering and Applications, Volume IX, Issue VIII, August 2015 www.ijcea.com ISSN 2321-3469 COUNTERMEASURE SELECTION FOR VIRTUAL NETWORK SYSTEMS USING NETWORK INTRUSION

More information

Chapter-8. Conclusion and Future Scope

Chapter-8. Conclusion and Future Scope Chapter-8 Conclusion and Future Scope This thesis has addressed the problem of Spam E-mails. In this work a Framework has been proposed. The proposed framework consists of the three pillars which are Legislative

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

Regular Paper Classification Method of Unknown Web Sites Based on Distribution Information of Malicious IP addresses

Regular Paper Classification Method of Unknown Web Sites Based on Distribution Information of Malicious IP addresses International Journal of Informatics Society, VOL.10, NO.1 (2018) 41-50 41 Regular Paper Classification Method of Unknown Web Sites Based on Distribution Information of Malicious IP addresses Shihori Kanazawa

More information

Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users

Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users ANT 2011 Dusan Stevanovic York University, Toronto, Canada September 19 th, 2011 Outline Denial-of-Service and

More information

Detecting malware even when it is encrypted

Detecting malware even when it is encrypted Detecting malware even when it is encrypted Machine Learning for network HTTPS analysis František Střasák strasfra@fel.cvut.cz @FrenkyStrasak Sebastian Garcia sebastian.garcia@agents.fel.cvut.cz @eldracote

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(7): Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(7): Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):1055-1063 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 The novel approach of P2P Botnet Node-based detection

More information

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES Narsaiah Putta Assistant professor Department of CSE, VASAVI College of Engineering, Hyderabad, Telangana, India Abstract Abstract An Classification

More information

Outline. Motivation. Our System. Conclusion

Outline. Motivation. Our System. Conclusion Outline Motivation Our System Evaluation Conclusion 1 Botnet A botnet is a collection of bots controlled by a botmaster via a command and control (C&C) channel Centralized C&C, P2P-based C&C Botnets serve

More information

BUILDING A NEXT-GENERATION FIREWALL

BUILDING A NEXT-GENERATION FIREWALL How to Add Network Intelligence, Security, and Speed While Getting to Market Faster INNOVATORS START HERE. EXECUTIVE SUMMARY Your clients are on the front line of cyberspace and they need your help. Faced

More information

Survey of the P2P botnet detection methods

Survey of the P2P botnet detection methods Survey of the P2P botnet detection methods Atef A. Obeidat 1, Mohmmad J. Bawaneh 1 1 Al-Huson University College, Al-Balqa Applied University, Al-Huson, Jordan Abstract: Botnets are one of the important

More information

Performance Analysis of Data Mining Classification Techniques

Performance Analysis of Data Mining Classification Techniques Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal

More information

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction International Journal of Computer Trends and Technology (IJCTT) volume 7 number 3 Jan 2014 Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction A. Shanthini 1,

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Synchronized Security

Synchronized Security Synchronized Security 2 Endpoint Firewall Synchronized Security Platform and Strategy Admin Manage All Sophos Products Self Service User Customizable Alerts Partner Management of Customer Installations

More information

Seceon s Open Threat Management software

Seceon s Open Threat Management software Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta CYBER ANALYTICS Architecture Overview Technical Brief May 2016 novetta.com 2016, Novetta Novetta Cyber Analytics: Technical Architecture Overview 1 INTRODUCTION 2 CAPTURE AND PROCESS ALL NETWORK TRAFFIC

More information

Big Data Analytics for Host Misbehavior Detection

Big Data Analytics for Host Misbehavior Detection Big Data Analytics for Host Misbehavior Detection Miguel Pupo Correia joint work with Daniel Gonçalves, João Bota (Vodafone PT) 2016 European Security Conference June 2016 Motivation Networks are complex,

More information

Listening to the Network: Leveraging Network Flow Telemetry for Security Applications Darren Anstee EMEA Solutions Architect

Listening to the Network: Leveraging Network Flow Telemetry for Security Applications Darren Anstee EMEA Solutions Architect Listening to the Network: Leveraging Network Flow Telemetry for Security Applications Darren Anstee EMEA Solutions Architect Introduction Security has an increased focus from ALL businesses, whether they

More information

SURVEY ON NETWORK ATTACK DETECTION AND MITIGATION

SURVEY ON NETWORK ATTACK DETECTION AND MITIGATION SURVEY ON NETWORK ATTACK DETECTION AND MITIGATION Welcome to the da/sec survey on network attack detection and mitigation. Network-based attacks pose a strong threat to the Internet landscape and academia

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Botnet Detection Using Honeypots. Kalaitzidakis Vasileios

Botnet Detection Using Honeypots. Kalaitzidakis Vasileios Botnet Detection Using Honeypots Kalaitzidakis Vasileios Athens, June 2009 What Is Botnet A Botnet is a large number of compromised computers, controlled by one or more Command-and-Control Servers, the

More information

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008 Internet Security Threat Report Volume XIII Patrick Martin Senior Product Manager Symantec Security Response October, 2008 Agenda 1 ISTR XIII Important Facts 2 ISTR XIII Key Messages 3 ISTR XIII Key Facts

More information

Multidimensional Investigation of Source Port 0 Probing

Multidimensional Investigation of Source Port 0 Probing DIGITAL FORENSIC RESEARCH CONFERENCE Multidimensional Investigation of Source Port 0 Probing By Elias Bou-Harb, Nour-Eddine Lakhdari, Hamad Binsalleeh and Mourad Debbabi Presented At The Digital Forensic

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Identifying Stepping Stone Attack using Trace Back Based Detection Approach

Identifying Stepping Stone Attack using Trace Back Based Detection Approach International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection

More information

1.1 SYMPTOMS OF DDoS ATTACK:

1.1 SYMPTOMS OF DDoS ATTACK: 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Entropy Based Approach for the Detection of DDOS Attack Abhilash Singh,

More information

Peer-to-Peer Botnet Detection Using NetFlow. Connor Dillon

Peer-to-Peer Botnet Detection Using NetFlow. Connor Dillon Peer-to-Peer Botnet Detection Using NetFlow Connor Dillon System and Network Engineering University of Amsterdam Master thesis presentation, July 3 rd 2014 Supervisor: Pepijn Janssen RedSocks Botnets Large

More information

DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes

DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes Abdul Fadlil Department of Electrical Engineering Ahmad Dahlan University Yogyakarta, Indonesia Imam Riadi Department of Information

More information

Security activities in Japan towards the future standardization. Cybersecurity

Security activities in Japan towards the future standardization. Cybersecurity Security activities in Japan towards the future standardization Side Event Cybersecurity Koji NAKAO KDDI, Japan Content Current threats - Internet User in Japan - However, observation of many scans (by

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

Enhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service

Enhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2. 2015 Enhanced Multivariate Correlation

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

Fast Deployment of Botnet Detection with Traffic Monitoring

Fast Deployment of Botnet Detection with Traffic Monitoring 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Fast Deployment of Botnet Detection with Traffic Monitoring Chung-Huang Yang Nation Kaohsiung Normal

More information

Encrypted Traffic Analytics

Encrypted Traffic Analytics Encrypted Traffic Analytics Introduction The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Encrypted Traffic Security (ETS) White Paper

Encrypted Traffic Security (ETS) White Paper Encrypted Traffic Security (ETS) White Paper The rapid rise in encrypted traffic is changing the security landscape. As more organizations become digital, an increasing number of services and applications

More information

Early detection of Crossfire attacks using deep learning

Early detection of Crossfire attacks using deep learning Early detection of Crossfire attacks using deep learning Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Ngai-Man Cheung Singapore University of Technology and Design Content The Crossfire Attack A brief

More information

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,

More information

IP Traceback Using DNS Logs against Bots

IP Traceback Using DNS Logs against Bots Journal of Information Processing Vol. 17 232 241 (Sep. 2009) Regular Paper IP Traceback Using DNS Logs against Bots Keisuke Takemori, 1 Masahiko Fujinaga, 1 Toshiya Sayama 1 and Masakatsu Nishigaki 2

More information

Chapter 2 Malicious Networks for DDoS Attacks

Chapter 2 Malicious Networks for DDoS Attacks Chapter 2 Malicious Networks for DDoS Attacks Abstract In this chapter, we explore botnet, the engine of DDoS attacks, in cyberspace. We focus on two recent techniques that hackers are using to sustain

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

Automating Security Response based on Internet Reputation

Automating Security Response based on Internet Reputation Add Your Logo here Do not use master Automating Security Response based on Internet Reputation IP and DNS Reputation for the IPS Platform Anthony Supinski Senior Systems Engineer www.h3cnetworks.com www.3com.com

More information

FPGA Based Distributed Network Intrusion Detection in Smart Grids Using Naives Bayes Classifier

FPGA Based Distributed Network Intrusion Detection in Smart Grids Using Naives Bayes Classifier International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 747-752 International Research Publications House http://www. irphouse.com FPGA Based Distributed

More information

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

More information

DNS Security. Ch 1: The Importance of DNS Security. Updated

DNS Security. Ch 1: The Importance of DNS Security. Updated DNS Security Ch 1: The Importance of DNS Security Updated 8-21-17 DNS is Essential Without DNS, no one can use domain names like ccsf.edu Almost every Internet communication begins with a DNS resolution

More information

Artificial Intelligence Drives the next Generation of Internet Security

Artificial Intelligence Drives the next Generation of Internet Security Artificial Intelligence Drives the next Generation of Internet Security Sam Lee Regional Director sam.lee@cujo.com Copyright 2017 CUJO LLC, All rights reserved. Artificial Intelligence Leads the Way Copyright

More information

Artificial Immune System against Viral Attack

Artificial Immune System against Viral Attack Artificial Immune System against Viral Attack Hyungjoon Lee 1, Wonil Kim 2*, and Manpyo Hong 1 1 Digital Vaccine Lab, G,raduated School of Information and Communication Ajou University, Suwon, Republic

More information

Automated Threat Management - in Real Time. Vectra Networks

Automated Threat Management - in Real Time. Vectra Networks Automated Threat Management - in Real Time Security investment has traditionally been in two areas Prevention Phase Active Phase Clean-up Phase Initial Infection Key assets found in the wild $$$$ $$$ $$

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

STUDY PAPER ON CLASSIFICATION TECHIQUE IN DATA MINING

STUDY PAPER ON CLASSIFICATION TECHIQUE IN DATA MINING Journal of Analysis and Computation (JAC) (An International Peer Reviewed Journal), www.ijaconline.com, ISSN 0973-2861 International Conference on Emerging Trends in IOT & Machine Learning, 2018 STUDY

More information

Can Passive Mobile Application Traffic be Identified using Machine Learning Techniques

Can Passive Mobile Application Traffic be Identified using Machine Learning Techniques Dublin Institute of Technology ARROW@DIT Dissertations School of Computing 2015-03-10 Can Passive Mobile Application Traffic be Identified using Machine Learning Techniques Peter Holland Dublin Institute

More information

Flows at Masaryk University Brno

Flows at Masaryk University Brno Flows at Masaryk University Brno Jan Vykopal Masaryk University Institute of Computer Science GEANT3/NA3/T4 meeting October 21st, 2009, Belgrade Masaryk University, Brno, Czech Republic The 2nd largest

More information

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Cooperative

More information

Future and Emerging Threats in ICT

Future and Emerging Threats in ICT Future and Emerging Threats in ICT www.ict-forward.eu Edita Djambazova Institute for Parallel Processing Bulgarian Academy of Sciences 1 Description ICT-FORWARD is a Coordination Action that aims at promoting

More information