Skip to main content

Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10063))

Included in the following conference series:

Abstract

Botnets are networks that are composed with a set of compromised machines called bots that are remotely controlled by a botmaster. They pose a threatening remark to network communications and applications. A botnet relies on its command and control communication channel for performing attacks. C2 traffic occurs prior to any attack; hence, the detection of botnet’s traffic helps in detecting the bots before any real attack happens. Recently, the HTTP based Botnet threat has become a serious challenge for security experts as Bots can be distributed quickly and stealthily. The HTTP Bots periodically connect to particular web pages or URLs to get commands and updates from the Botmaster. In fact, this identifiable periodic connection pattern has been used to detect HTTP Botnets. This paper proposes an idea for identifying bots that exhibit non periodic nature as well normal traffic that exhibit periodic nature. The proposed method reduces the false positive rate as well as increases the detection rate. For that a set of traffic features are taken from many detection methods and feature selection is made on these features. Feature selection helps in enhancing the detection rate of the bot traffic in the network. For performing feature selection Principal Components Analysis is chosen. Top ranked features from PCA are added to existing work. Result shows improvement in detection rate and reduction in false positive rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection and defense. IEEE J. Commun. Surv. Tutorials 16(2), 898–924 (2013)

    Article  Google Scholar 

  2. Moura, J.M.F.: An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic. J. Adv. Res. 5, 435–448 (2014)

    Article  Google Scholar 

  3. Eslahi, M., et al.: Periodicity classification of HTTP traffic to detect HTTP Botnets. In: 2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE (2015)

    Google Scholar 

  4. Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39, 2–16 (2013). Elsevier

    Article  Google Scholar 

  5. Bacher, P., Holz, T., Kotter, M., Wicherski, G.: Know your enemy: tracking botnets (using honeynets to learn more about bots). Technical report, The Honeynet Project (2008)

    Google Scholar 

  6. Goebel, J., Holz, T.: Rishi: identify bot contaminated hosts by IRC nickname evaluation. In: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Berkeley, CA, USA, p. 8. USENIX Association

    Google Scholar 

  7. Estévez-Tapiador, J.M., García-Teodoro, P., Díaz-Verdejo, J.E.: Anomaly detection methods in wired networks: a survey and taxonomy. Comput. Netw. 27(16), 1569–1584 (2004)

    Google Scholar 

  8. Choi, H., Lee, H., Lee, H., Kim, H.: Botnet detection by monitoring group activities in DNS traffic. In: 7th IEEE International Conference on Computer and Information Technology, CIT 2007, pp. 715–720, October 2007

    Google Scholar 

  9. Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., Wang, L.: On the analysis of the Zeus botnet crimeware toolkit. In: 2010 Eighth Annual International Conference on Proceedings of the Privacy Security and Trust (PST), pp. 31–38 (2010)

    Google Scholar 

  10. Li, C., Jiang, W., Zou, X.: Botnet: survey and case study. IEEE (2009). ISBN 978–0- 7695-38730

    Google Scholar 

  11. Weisstein, E.W.: Absolute frequency (2015). http://mathworld.wolfram.com/AbsoluteFrequency.html

  12. Wei, L., Tavallaee, M., Rammidi, G., Ghorbani, A.A.: BotCop: an online botnet traffic classifier. In: Proceedings of the Communication Networks and Services Research Conference, CNSR 2009, Seventh Annual, pp. 70–77 (2009)

    Google Scholar 

  13. Shah, C.: Periodic connections to control server offer new way to detect botnets (2013). http://blogs.mcafee.com/mcafee-labs/periodiclinks-to-control-server-offer-new-way-to-detect-botnets

  14. Dray, S.: On the number of principal components: a test of dimensionality based on measurements of similarity between matrices. Comput. Stat. Data Anal. 52, 2228–2237 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  15. Garcia, S., Grill, M., Stiborek, H., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. J. 45, 100–123 (2014). Elsevier

    Article  Google Scholar 

  16. Livadas, C., Walsh, R., Lapsley, D., Timothy Strayer, W.: Using machine learning techniques to identify botnet traffic. Project report (2007)

    Google Scholar 

  17. Tegeler, F., Fu, X., Vigna, G., Kruegel, C.: BotFinder: finding bots in network traffic without deep packet inspection. Proceedings (2012)

    Google Scholar 

  18. Gu, G., Zhang, J., Lee, W.: BotSniffer – detecting botnet command and control channels in network traffic. In: Proceedings of the Internet Society (ISOC), San Diego (2008)

    Google Scholar 

  19. Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: detecting malware infection through IDS-driven dialog correlation. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to T. Harsha or S. Asha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Harsha, T., Asha, S., Soniya, B. (2016). Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic. In: Ray, I., Gaur, M., Conti, M., Sanghi, D., Kamakoti, V. (eds) Information Systems Security. ICISS 2016. Lecture Notes in Computer Science(), vol 10063. Springer, Cham. https://doi.org/10.1007/978-3-319-49806-5_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49806-5_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49805-8

  • Online ISBN: 978-3-319-49806-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics