Evaluation on Botnet Detection

Download Report

Transcript Evaluation on Botnet Detection

Automatic Discovery of Botnet
Communities on Large-Scale
Communication Networks
Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium
on InformAtion, Computer and Communications Security (ASIACCS’09).
2009
Reporter: 高嘉男
Advisor: Chin-Laung Lei
2009/09/28
1
Outline
Introduction
 Methodology
 Traffic Classification

◦ Payload signature based classification
◦ Identifying unknown traffic applications
Botnet Detection
 Experimental Evaluation
 Conclusions

2
Life-cycle of an IRC Botnet
3
Approaches of Botnet Detection

Honeypots
◦ Capture malware & understand the behavior of botnets.

Passive anomaly analysis
◦ Usually independent of the traffic content
◦ Example: Botsniffer & Botminer

Traffic application classification
◦ Classifying traffic into IRC traffic & non-IRC traffic
◦ Can only detected IRC based botnets
4
Two Challenges of Botnet Detection

Detect new (or recent) appeared botnets
◦ Centralized C&C structure -> decentralized (P2P) structure
◦ Network protocols: IRC or HTTP -> own developed protocol

Identify applications for network traffic
◦ Port number: limited information
◦ Examine the payload of network flows and then
create signatures for each application
 Legal issues related to privacy
 Encrypted traffic
 40% network flows cannot be classified
5
Methodology
6
Payload Signature based Classification

Characteristics of bit strings in the payload
7
Payload Signature based Classification (cont’d)
8
Identifying Unknown Traffic Applications

Basic idea:
◦ Association relationship between known traffic &
unknown traffic

Step 1:
◦ Cluster flows in terms of the src IP & the dst IP
◦ Generate a set of rectangles -> community

Step 2:
◦ Cluster flows in terms of the dst IP & the dst port
◦ Generate a set of rectangles -> application
community

Label each application community
◦ Assign unknown flows according to probability of
known flows
9
Identifying Unknown Traffic Applications (cont’d)
10
Identifying Unknown Traffic Applications (cont’d)
11
Botnet Detection

Object:
◦ Differentiate the botnet behavior from the normal
traffic on a specific application community

Concept:
◦ Temporal-frequent characteristics of the 256
ASCII binary bytes in the payload over a time
period

Botnet behavior:
◦ Response time of bots: immediate and accurate once
they receive commands
◦ Bots might be synchronized with each other
12
Detection Algorithm
13
Detection Algorithm (cont’d)

Metric: standard deviation for sm each cluster m
◦ The higher the value of average sm over 256
ACSII characters for flows on a cluster m, the
more normal the cluster m is.

Given the frequency vectors for n flows:
◦ sj = standard deviation of the jth ASCII over n
flows
◦ s : average standard deviation over 256 ACSII
characters for flows
14
Detection Algorithm (cont’d)
15
Tested Network Topology
16
Evaluation on Traffic
Classification

Part of known traffic → label them as unknown
17
Evaluation on Botnet
Detection
18
Evaluation on Botnet Detection
(cont’d)
19
Conclusions
They propose a novel application discovery
approach for automatically classifying network
applications on a large-scale WiFi ISP network.
 They develop a generic algorithm to discriminate
general botnet behavior from the normal network
traffic on a specific application community, which is
based on n-gram (frequent characteristics) of flow
payload over a time period (temporal
characteristics).
 Evaluation results show that their approach obtains
a very high detection rate (approaching 100% for
IRC bot) with a low false alarm rate when detecting
IRC botnet traffic.

20
Reference

Lu, W., M. Tavallaee, and A.A. Ghorbani,
“Automatic Discovery of Botnet
Communities on Large‐Scale
Communication Networks”, in ACM
Symposium on InformAtion, Computer and
Communications Security (ASIACCS’09).
2009: Sydney, Australia.
21