skip to main content
10.1145/2420950.2420969acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis

Published:03 December 2012Publication History

ABSTRACT

Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of research has focused on methods for detecting and mitigating the effects of botnets. Two of the primary factors preventing the development of effective large-scale, wide-area botnet detection systems are seemingly contradictory. On the one hand, technical and administrative restrictions result in a general unavailability of raw network data that would facilitate botnet detection on a large scale. On the other hand, were this data available, real-time processing at that scale would be a formidable challenge. In contrast to raw network data, NetFlow data is widely available. However, NetFlow data imposes several challenges for performing accurate botnet detection.

In this paper, we present Disclosure, a large-scale, wide-area botnet detection system that incorporates a combination of novel techniques to overcome the challenges imposed by the use of NetFlow data. In particular, we identify several groups of features that allow Disclosure to reliably distinguish C&C channels from benign traffic using NetFlow records (i.e., flow sizes, client access patterns, and temporal behavior). To reduce Disclosure's false positive rate, we incorporate a number of external reputation scores into our system's detection procedure. Finally, we provide an extensive evaluation of Disclosure over two large, real-world networks. Our evaluation demonstrates that Disclosure is able to perform real-time detection of botnet C&C channels over datasets on the order of billions of flows per day.

References

  1. Alexa Web Information Company. http://www.alexa.com/topsites/, 2009.Google ScholarGoogle Scholar
  2. EXPOSURE: Exposing Malicious Domains. http://exposure.iseclab.org/, 2011.Google ScholarGoogle Scholar
  3. FIRE: FInding RoguE Networks. http://www.maliciousnetworks.org/, 2011.Google ScholarGoogle Scholar
  4. Google Safe Browsing. http://www.google.com/safebrowsing/diagnostic?site=AS:as_number, 2011.Google ScholarGoogle Scholar
  5. L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi. Exposure: Finding malicious domains using passive dns analysis. In 18th Annual Network and Distributed System Security Symposium (NDSS'11), 2011.Google ScholarGoogle Scholar
  6. J. Binkley and S. Singh. An Algorithm for Anomaly-based Botnet Detection. In Usenix Steps to Reduce Unwanted Traffic on the Internet (SRUTI), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. E. P. Box, G. M. Jenkins, and G. Reinsel. Time Series Analysis: Forecasting and Control. In 3rd eddition Upper Saddle River, NJ: Prentice-Hall, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian. Anomaly extraction in backbone networks using association rules. In ACM Internet Measurement Conference (IMC'09), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Brauckhoff, B. Tellenbach, A. Wagner, M. May, and A. Lakhina. Impact of packet sampling on anomaly detection metrics. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Claise. Cisco systems netflow services export version 9, 2004.Google ScholarGoogle Scholar
  11. E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In 1st Workshop on Steps to Reducing Unwanted Traffic on the Internet, pages 39--44, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Cristianini and J. Shawe-Taylor. An introduction to support vector machines and other kernel-based learning methods. In Cambridge University Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In Proceedings of the 2007 workshop on Large scale attack defense (LSAD'07), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Francois, S. Wang, R. State, and T. Engel. Bottrack: Tracking botnets using netflow and pagerank. In IFIP Networking 2011, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. F. Freiling, T. Holz, and G. Wicherski. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. In 10th European Symposium On Research In Computer Security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by IRC nickname evaluation. In Workshop on Hot Topics in Understanding Botnets, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In Usenix Security Symposium, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In 16th Usenix Security Symposium, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In 15th Annual Network and Distributed System Security Symposium (NDSS), 2008.Google ScholarGoogle Scholar
  20. J. John, A. Moshchuk, S. Gribble, and A. Krishnamurthy. Studying Spamming Botnets Using Botlab. In 6th Usenix Symposium on Networked Systems Design and Implementation (NSDI), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Karasaridis, B. Rexroad, and D. Hoeflin. Wide-scale Botnet Detection and Characterization. In Usenix Workshop on Hot Topics in Understanding Botnets, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. E. Knuth. Seminumerical algorithms. In The Art of Computer Programming, Volume 2, Addison Wesley, 1969.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Liaw and M. Wiener. Classification and regression by randomforest. In R News, volume 2/3, page 18, 2002.Google ScholarGoogle Scholar
  24. C. Livadas, R. Walsh, D. Lapsley, and W. T. Strayer. Using machine learning techniques to identify botnet traffic. In the 2nd IEEE LCN Workshop on Network Security (WoNS'2006), 2006.Google ScholarGoogle Scholar
  25. J. Mai, C.-N. Chuah, A. Sridharan, T. Ye, and H. Zang. Is sampled data sufficient for anomaly detection? In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Quinlan. C4.5: Programs for machine learning. In Morgan Kaufmann Publishers, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multi-faceted Approach to Understanding the Botnet Phenomenon. In Internet Measurement Conference (IMC), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In SIGCOMM Comput. Commun., 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Reiter and T. Yen. Traffic aggregation for malware detection. In DIMVA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. A. Sperotto, R. Sadre, and A. Pras. Anomaly characterization in flow-based traffic time series. In Proceedings of the 8th IEEE international workshop on IP Operations and Management, IPOM '08, pages 15--27, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B. Stone-Gross, C. Kruegel, K. Almeroth, A. Moser, and E. Kirda. Fire: Finding rogue networks. In 2009 Annual Computer Security Applications Conference (ACSAC'09), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. W. Strayer, R. Walsh, C. Livadas, and D. Lapsley. Detecting Botnets with Tight Command and Control. In 31st IEEE Conference on Local Computer Networks (LCN), 2006.Google ScholarGoogle Scholar
  33. S. Theodoridis and K. Koutroumbas. Pattern Recognition. Academic Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. A. Wagner and B. Plattner. Entropy based worm and anomaly detection in fast ip networks. In SIG SIDAR Graduierten-Workshop uber Reaktive Sicherheit (SPRING'06), 2006.Google ScholarGoogle Scholar
  35. P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, and E. Kirda. Automatically generating models for botnet detection. In ESORICS 2009: 14th European Symposium on Research in Computer Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ACSAC '12: Proceedings of the 28th Annual Computer Security Applications Conference
          December 2012
          464 pages
          ISBN:9781450313124
          DOI:10.1145/2420950

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 December 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ACSAC '12 Paper Acceptance Rate44of231submissions,19%Overall Acceptance Rate104of497submissions,21%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader