AN INTELLIGENT NETWORK TRAFFIC BASED BOTNET DETECTION SYSTEM

Similar documents
Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Lecture 12. Application Layer. Application Layer 1

Basic Concepts in Intrusion Detection

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

A Review Paper on Network Security Attacks and Defences

NETWORK SECURITY. Ch. 3: Network Attacks

Multi-phase IRC Botnet & Botnet Behavior Detection Model

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Intelligent and Secure Network

Multivariate Correlation Analysis based detection of DOS with Tracebacking

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

DDOS Attack Prevention Technique in Cloud

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

EE 122: Network Security

Denial of Service, Traceback and Anonymity

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

DDOS DETECTION SYSTEM USING C4.5 DECISION TREE ALGORITHM

Botnet Detection Using Honeypots. Kalaitzidakis Vasileios

Multi-Stream Fused Model: A Novel Real-Time Botnet Detecting Model

Distributed Denial of Service (DDoS)

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Chapter 4. Network Security. Part I

Chapter 7. Denial of Service Attacks

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

Chapter 10: Denial-of-Services

BOTNET-GENERATED SPAM

4. The transport layer

Introduction to Security. Computer Networks Term A15

CSE 565 Computer Security Fall 2018

Denial of Service and Distributed Denial of Service Attacks

Computer Networking Introduction

CSE 565 Computer Security Fall 2018

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

Protecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10

CTS2134 Introduction to Networking. Module 08: Network Security

Enhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

DDoS Testing with XM-2G. Step by Step Guide

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

DENIAL OF SERVICE ATTACKS

Internet Security: Firewall

Intrusion Detection and Prevention in Internet of Things

To Study and Explain the Different DDOS Attacks In MANET

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

CSEE 4119 Computer Networks. Chapter 1 Introduction (4/4) Introduction 1-1

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

CSE Computer Security (Fall 2006)

DNS Security. Ch 1: The Importance of DNS Security. Updated

Denial of Service (DoS)

Chapter 8 roadmap. Network Security

Computer Security: Principles and Practice

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Configuring attack detection and prevention 1

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection

Detecting Spam Zombies by Monitoring Outgoing Messages

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Venusense UTM Introduction

With turing you can: Identify, locate and mitigate the effects of botnets or other malware abusing your infrastructure

P2P Botnet Detection Method Based on Data Flow. Wang Jiajia 1, a Chen Yu1,b

Training UNIFIED SECURITY. Signature based packet analysis

Elementary Computing CSC 100. M. Cheng, Computer Science

Automation the process of unifying the change in the firewall performance

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

Attack Prevention Technology White Paper

HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION

W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

CompTIA E2C Security+ (2008 Edition) Exam Exam.

A Firewall Architecture to Enhance Performance of Enterprise Network

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

COMPUTER NETWORK SECURITY

Developing the Sensor Capability in Cyber Security

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Seceon s Open Threat Management software

Model the P2P Attack in Computer Networks

IoT DDoS Attacks Detection based on SDN RAMTIN ARYAN

CSC 574 Computer and Network Security. TCP/IP Security

CSE Computer Security

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Pioneer Communications Internet Services Disclosure

end systems, access networks, links circuit switching, packet switching, network structure

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Demystifying Service Discovery: Implementing an Internet-Wide Scanner

Introduction and Statement of the Problem

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

CIH

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

Detecting Botnets Using Cisco NetFlow Protocol

Anatomy and Mechanism of DOS attack

International Journal of Computer Trends and Technology (IJCTT) Volume54 Issue 1- December 2017

Application of Revised Ant Colony Optimization for Anomaly Detection Systems

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Transcription:

AN INTELLIGENT NETWORK TRAFFIC BASED BOTNET DETECTION SYSTEM D.Gayatri 1, Ravi Kumar Routhu 2 1 Student, M.TECH, 2 Assistant Professor Department of CSE, MVGR College of Engineering ABSTRACT Networking is categorized as connectivity and sharing. A network connects computers and users together. The whole is greater than the sum of its parts - a phrase that describes networking very well, thereby allows to share information and resources along with cooperation among the devices. While sharing of resources and considering connection issues there leads to attacks regarding security like worms, viruses, Denial-of- Service etc. These days Botnet is one of a major kind of problems in networking which is extremely harmful for computer network security. Botnet is a network of compromised work stations under the control of an attacker. The proposed method involves an algorithm detecting the botnets by analyzing the Network Traffic. Index terms: Botnet, whitelist, bot queries I INTRODUCTION: A network is a collection of devices which are interconnected. The devices share the information among themselves via data links available in network [13]. For a network there exists a client and a server that connect to each other through request sent to each other. Let us consider an example where the server holds a web site and on the other hand web browser is the client. On typing http://www.google.com the browser connects to server which is at http://www.google.com thereby establishing communication. Generally Network security includes provisions and policies by an administrator for controlling the unauthorized access, data manipulation, denial of network and accessible resources. With the growth of attacks thee also evolve defensive methods against these attacks in the Network Security technology. For example physical Network security, password protection, spyware, online privacy. These attacks today mainly include rapid growth of botnet activities which leads to huge loss if they increase in number. A bot is referred as a zombie which is an individual device connected to Internet Protocol (IP) network [12]. The devices that are vulnerable are the one which become the bot (it may include computers, laptops, printers, routers etc.). Botnets are continuously emerging challenges for user confidence and security as they spread spam and overload websites for crashing and lead to financial hindrance [18]. The frequent applications of botnets include email spams, DOS attacks, spreading spyware and also data theft. Once the device is infected by botnet virus, it gets connected to bot header s command and control server (C&C)[14]. Usually the botnet detection is very typical since the bots were designed to operate without user s knowledge. Some methods do involve in detecting these botnets so far. Some of them are IRC traffic [14](botnets and bot masters use IRC for communications)connection attempts with known C&C servers, Multiple machines on a network making identical DNS requests, High outgoing SMTP traffic (,Unexpected pop ups, Slow computing/high CPU usage, Spikes in traffic, especially Port 6667 (used for IRC), Port 25 (used in email spamming), and Port 1080 (used by proxy servers)outbound messages (email, social media, instant messages, etc) which were not sent by problems occurred for users with internet access. 45

II RELATED WORK: Wang, Jing, and Ioannis Ch Paschalidis proposed [1] a novel botnet detection method which analyzes the relationship of nodes is proposed. The method consists of two stages in which one determines the anomaly detection in interaction of graphs and the second stage determines the community detection in a social correlation graph. Here botnets are detected with sophisticated C&C channels. The method for detecting botnets are more generalized. The refined modularity also contains some limitations. Thangapandiyan, M., and PM Rubesh Anand [2] proposed for recognizing botnets in a p2p network. The proposed framework assesses the flow export out utilizing a convention called Net flow. The packet flow is investigated by utilizing exporter, authority and analyzer. Exporter catches the bundles and screens the substance and authority catches the stream activity and the analyzer investigations these movement which is gathered. What's more, this framework gives less time utilization and the recognition of these bots is high when contrasted with other. And furthermore expanded attack counteractive action. Kong, Xinling, et al [3] botnet detection technique is proposed that analyzes the packet information based on graph structure clustering. This for the most part investigations the data about the data and time stamp stream. Similitude similarity matching algorithm is proposed to quantify the flow matching degree. This is to discover the sender of each cluster that is controlled. In this manner our clustering results have high freedom. Furthermore, the detection rate is high. Strayer, W. Timothy, et al [4] paper botnets are distinguished by presenting a special architecture. In this looks at the flow characteristics, for example, data transfer capacity, duration and packet timing. It initially dispenses with the activity that is probably not going to be a piece of botnet. And furthermore correspondence designs which propose the activity of a botnet. Bouguessa, Mohamed, Rokia Missaoui, and Mohamed Talb [5] proposed in which community detection performed in two stages. The principal stage misuses the covariance of connections amongst hubs and the interclass inactivity keeping in mind the end goal to play out an underlying partitioning of the system. Furthermore, the second stage which recognizes these gathering of hubs. There is an enhanced nature of community detection. Jianguo, Jiang, et al [6] attempted to discover what highlight extractor is more powerful in the identification of a botnet. A few measures are taken for assessment of feature extractors. Tranalyzer are extremely sufficiently successful to accomplish perfect botnet detection performance and Tranalyzer is by all accounts marginally better if contrasted with Net Mate. James R. Binkley [10] introduced an anomaly based algorithm for detecting IRC-based botnet networks. The algorithm combines an IRC mesh detection part with a TCP examine detection heuristic called the TCP work weight. The IRC segment produces two tuples, one for determining the IRC work in view of IP channel names, and a sub-tuple which gathers statistics (counting the TCP work weight) on individual IRC host in channels. This algorithm has been conveyed in PSU's DMZ for over a year and has demonstrated in diminishing the quantity of botnet clients. Li Sheng Liu Zhiming [7] proposed a novel frame work and arithmetic for identifying botnets. This approach made out of two segments: data collection and filter. The principal area is conveyed in dispersed has with a specific end goal to catch network traffic information to filter and classify the information. Second area is deployed in centralized put which gathers all information from distributed hosts and distinguish the botnets by utilizing algorithms. III METHODOLOGY: A botnet is a system of computers that are compromised frequently called Zombies infected with malware that enables an attacker to control them. Every PC in a botnet is known as a bot. A bot master is the one who take control of botnets. Botnets are normally utilized for Distributed Denial-of-Service (DDOS) attacks, click fraud or spamming. DDOS attacks flood the victim with packets/requests from many bots there by consuming critical resources. On gaining the resources these refuse service to authentic clients. Some basic type of DDOS attacks are UDP, ICMP, Ping of death and so forth. It is attack in which different compromised systems attack a target and cause denial of service for users of targeted resource. Botnet attacks are omnipresent. These cause minimum loss of $10,000. On account of these losses occurred, botnet detection has got significant consideration. Generally intrusion detection 46

centers around individual hosts but doesn.t concentrate on preventing botnet formation. Botnets make use of IRC [20], a protocol that is developed for internet chat for commanding and controlling their bots. Here botnets are regarded as infected machines. In this case many number of botnet detection methods came into existence. Some methods includes handling botnets using flexible C&C channels. Botnets leads to DDOS attacks that aims to prevent normal communication by disabling the resources or the infrastructure that is providing the connectivity. Some of the common indications of this attack are as follows Unavailability of a resources Loss of access to a website slow performance Increase in spam e-mails And the types of DDOS attacks include service request flood, SYN attack, ping of death, smurf etc. The proposed algorithm identifies botnets on considering the network traffic there by differentiating botnets and whitelists individually. Whitelists are not botnets but the one which considered as trusted users. As usual botnets aim for attacking the target devices. BOTNET DETECTION ALGORITHM: 1. Take Input file from connected Network Server. 2. Classify Network based on ip address. 3. Using packet Handler and based on header ip classify the traffic as UDP & TCP. 4. If the traffic is UDP go to step5. 5. If destination port= = 53 call process Query Method and go to step6 Else exit/ go to step3 6. call process DNS and go to step10 7. If traffic is TCP call Store work weight method. 8. Check for IRC method 9. If packet has get or post then store http request go to step10. Else Gotostep3 10. For each host if packet count size>7 then write it into print bot queries Else Print them as whitelist. Network Traffic Botnet Detection Algorithm Detection of Fig1: Process to detect botnets White List Bot Queries We take network traffic into consideration so that to identify bots in the network with the help of Botnet detection algorithm. Some methods have been used for identifying the bots. In the proposed algorithm we process queries and check IRC by using messages (like ping, pong and previous message). We also obtain threshold value and using this value the bots are detected. Finally we obtain bot queries, whitelist and host information. Based on this information obtained some calculations have been performed. The calculations include Accuracy and F-measure. IV ENVIRONMENTAL SETUP: The experiment is performed considering Network Traffic of a system using botnet detection algorithm to identify bots using java 1.6 along with the Eclipse Environment. V RESULTS: We apply the botnet detection algorithm on network traffic and it detects botnets. It produce a whitelist and bot Queries. Based on these whitelist and bot queries, we perform some calculations. In the field of machine learning confusion matrix is a table that is used for describing the performance of classification model over a set of test data there by knowing the true values. It is easily understood. It contains two rows and two columns reporting the number of false positives, false negatives, true positives and true negatives there by allowing for detailed analysis. The instances are represented by the each row of matrix in the predicted class and the columns indicates the instances of an actual class. Distribution of one variable in rows and another in columns for studying the correlation between the two variables is what contingency table stands for: 47

Confusion Matrix: 1.2 Table1: Confusion Matrix 1 P N 0.8 T 95 5 0.6 0.4 F 0 100 0.2 Basically regarding the table we considered true positives and false negatives. A true positive occurs when the proportion of positives were correctly identified. A true negative is one which doesn t detect the condition when the condition is absent. A false positive is on which detects the condition when the condition is absent. A false negative does not detect the condition even though the condition is present. Precision is measured by the fraction of pairs correctly [16] put in the cluster and recall is considered as fraction of actual pairs that are obtained. F-measure is the obtained by calculating mean of precision and recall. F-measure= Precision and Recall are calculated as follows, Precision = Recall = The purity measures the clustering in both method for recovering known classes which are applicable even though the number of clusters are different from known classes. Precisi on Error rate= Accuracy= Where, Total = TP+TN+FP+FN Rec all Table 2: calculations F- mea sure Erro r rate Accur acy Puri ty 1 0.48 0.65 0.51 0.5 0.97 For the above calculation the regarding graph is represented as follows. 0 Fig2: Graphical Representation of various Matrix VI CONCLUSION: The detection procedure is split into two phases.1identifying Whitelist and 2.Bot queries. Based on network traffic the botnets are identified. The proposed method has shown efficiency in performance based on the purity calculated and also reduced the false positive rate. REFERENCES: [1] Wang, Jing, and Ioannis Ch Paschalidis. "Botnet detection using social graph analysis." Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on. IEEE, 2014. [2] Thangapandiyan, M., and PM Rubesh Anand. "An efficient botnet detection system for P2P botnet." Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference on. IEEE, 2016. [3] Kong, Xinling, et al. "A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering." Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2016 International Conference on. IEEE, 2016. [4] Strayer, W. Timothy, et al. "Detecting botnets with tight command and control." Local Computer Networks, Proceedings 2006 31st IEEE Conference on. IEEE, 2006. [5] Bouguessa, Mohamed, Rokia Missaoui, and Mohamed Talbi. "A Novel Approach for Detecting Community Structure in Networks." Tools with Artificial Intelligence (ICTAI), 2014 IEEE 26th International Conference on. IEEE, 2014. 48

[6] Jianguo, Jiang, et al. "Botnet Detection Method Analysis on the Effect of Feature Extraction." Trustcom/BigDataSE/I SPA, 2016 IEEE. IEEE, 2016. [7] Sheng, Li, et al. "A distributed botnet detecting approach based on traffic flow analysis." Instrumentation, Measurement, Computer, Communication and Control (IMCCC), 2012 Second International Conference on. IEEE, 2012. [8] Lin, Hsiao-Chung, Chia-Mei Chen, and Jui-Yu Tzeng. "Flow based botnet detection." Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on. IEEE, 2009. [9] Liu, Dan, et al. "A P2P-botnet detection model and algorithms based on network streams analysis." Future Information Technology and Management Engineering (FITME), 2010 International Conference on. Vol. 1. IEEE, 2010. [10] Binkley, James R., and Suresh Singh. "An Algorithm for Anomaly-based Botnet Detection." SRUTI 6 (2006): 7-7. [11] Wang, Jing, and Ioannis Ch Paschalidis. "Botnet detection based on anomaly and community detection." IEEE Transactions on Control of Network Systems 4.2 (2017): 392-404. [12] https://blog.emsisoft.com/en/27233/what -is-a-botnet/ [13] https://community.rsa.com/community/p roducts/netwitness/blog/2017/06/09/anintroduction-to-botnets/ [14] https://www.veracode.com/security/botn et [15] Grizzard, Julian B., et al. "Peer-to-Peer Botnets: Overview and Case Study." HotBots 7 (2007): 1-1. [16] https://nlp.stanford.edu/irbook/html/htmledition/evaluation-ofclustering-1.html [17] https://secure.nic.cz/files/labs/csirt- 20091102-OS-Botnet-CEPOL.pdf [18] https://en.wikipedia.org/wiki/botnet [19] Ashley, Daryl. "An algorithm for http bot detection." University of Texas at Austin- Information Security Office (2011). [20] Lu, Wei, and Ali A. Ghorbani. "Botnets detection based on irccommunity." Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. IEEE, 2008. 49