skip to main content
10.1145/1529282.1529734acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Bayesian bot detection based on DNS traffic similarity

Published:08 March 2009Publication History

ABSTRACT

Bots often are detected by their communication with a command and control (C&C) infrastructure. To evade detection, botmasters are increasingly obfuscating C&C communications, e.g., by using fastflux or peer-to-peer protocols. However, commands tend to elicit similar actions in bots of a same botnet. We propose and evaluate a Bayesian approach for detecting bots based on the similarity of their DNS traffic to that of known bots. Experimental results and sensitivity analysis suggest that the proposed method is effective and robust.

References

  1. K. Ishibashi, T. Toyono, K. Toyama, M. Ishino, H. Ohshima, I. Mizukoshi, "Detecting MassMailing Worm Infected Hosts by Mining DNS Traffic Data," ACM Symposium proceedings on Communications architectures and protocols (SIGCOMM '05), pp 159--164, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Stewart. "Truman - The Reusable Unknown Malware Analysis Net." {Online} http://www.secureworks.com/research/tools/truma.htmlGoogle ScholarGoogle Scholar
  3. Pang-Ning Tan, Michael Steinbach, Vipin Kumar, "Introduction to Data Mining" (1st ed.) Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. McAfee © SiteAdvisor, "Report for cpaclicks.com," {Online} http://www.siteadvisor.com/sites/cpaclicks.comGoogle ScholarGoogle Scholar
  5. The Honeynet Project, "Know your Enemy: Tracking Botnets -- Bot-Commands", {Online} http://honeynet.org/papers/bots/botnet-commands.htmlGoogle ScholarGoogle Scholar
  6. Kaspersky Lab's VirusList.com, "Backdoor.SdBot.gen" http://viruslist.com/en/viruses/encyclopedia?virusid=24976Google ScholarGoogle Scholar
  7. Kaspersky Lab's VirusList.com, "Net-Worm.Win32.Bobic.k", {Online} http://viruslist.com/en/viruses/encyclopedia?virusid=90085Google ScholarGoogle Scholar
  8. Shawn Collins' Affiliate Marketing Blog, "Florida Attorney General Investigates Affiliate Marketers," {Online} http://blog.affiliatetip.com/archives/florida-attorney-general-investigates-affiliate-marketers/Google ScholarGoogle Scholar
  9. F. Weimer. "Passive DNS Replication," in Proc. 17th Annual FIRST Conf., July 2005. {Online} http://www.first.org/conference/2005/papers/florian-weimer-paper-1.pdfGoogle ScholarGoogle Scholar
  10. Kaspersky Lab's VirusList.com, "Email-Worm.Win32.NetSky.ae," {Online} http://viruslist.com/en/viruses/encyclopedia?virusid=50431Google ScholarGoogle Scholar
  11. MWCollect. "Malware Dedicated Whitehats." {Online} http://www.mwcollect.org/Google ScholarGoogle Scholar
  12. VirusTotal. "Free Online Virus and Malware Scan." {Online} http://www.virustotal.com/Google ScholarGoogle Scholar
  13. Gary Robinson. "A statistical approach to the spam problem". In Linux Journal 107, March 2003, {Online} http://www.linuxjournal.com/article.php?sid=6467 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Gary Robinson, "Spam Detection", {Online} http://radio.weblogs.com/0101454/stories/2002/09/16/spamDetection.htmlGoogle ScholarGoogle Scholar
  15. Greg Louis, "Bogofilter Calculations: Comparing Geometric Mean with Fisher's Method for Combining Probabilities," {Online} http://www.bgl.nu/bogofilter/fisher.htmlGoogle ScholarGoogle Scholar
  16. N. Ianelli and A. Hackworth. Botnets as a Vehicle for Online Crime. CERT Coordination Center, 2005.Google ScholarGoogle Scholar
  17. Evan Cooke and Farnam Jahanian. The zombie roundup: Understanding, detecting, and disrupting botnets. In Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Shadowserver Foundation. {Online} http://shadowserver.org/wiki/pmwiki.php?n=Shadowserver.ShadowserverGoogle ScholarGoogle Scholar
  19. Honeynet Project. "Know Your Enemy: Fast-Flux Service Networks." {Online} http://www.honeynet.org/papers/ff/fast-flux.pdfGoogle ScholarGoogle Scholar
  20. Paul Graham, "A Plan for Spam," {Online} http://www.paulgraham.com/spam.html.Google ScholarGoogle Scholar
  21. Jonathan Zdziarski, "Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification". No Starch Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Paul Albitzand and Cricket Liu, "DNS and BIND". O'Reilly and Associates, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim, "Botnet Detection by Monitoring Group Activities in DNS Traffic," in 7th IEEE International Conference on Computer and Information Technology (CIT), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. Gu, P. Porras, V. Yegneswaran, M. Fong, W. Lee: "BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In Proc. of USENIX Security Symposium, Boston, MA, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. "A multi-faceted approach to understanding the botnet phenomenon". In Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference, Brazil, October 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. G. Gu, J. Zhang and W. Lee. "BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic," in Proceedings of the 15th Annual Network and Distributed System Security Symposium, ISOC, February 2008.Google ScholarGoogle Scholar
  27. David Heckerman. "A tutorial on learning with Bayesian networks." In Michael Jordan, editor, Learning in Graphical Models, pages 301--354. Kluwer Academic, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. K. Reiter and T.-F. Yen. "Traffic aggregation for malware detection." In Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'08), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Inoue, D. Yoshioka, K. Eto, M. Hoshizawa, Y. Nakao, K. "Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity". IEEE International Conference on Communications (ICC) 2008.Google ScholarGoogle Scholar
  30. Villamarín-Salomón, R., Brustoloni, J. C. "Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic". 5th IEEE Consumer Communications and Networking Conference (CCNC), 2008.Google ScholarGoogle Scholar

Index Terms

  1. Bayesian bot detection based on DNS traffic similarity

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
          March 2009
          2347 pages
          ISBN:9781605581668
          DOI:10.1145/1529282

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 March 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader