Skip to main content

Detection of IP Gangs: Strategically Organized Bots

  • Conference paper
  • First Online:
Advances in Data Mining. Applications and Theoretical Aspects (ICDM 2018)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10933))

Included in the following conference series:

  • 1086 Accesses

Abstract

Botnets, groups of malware-infected computers (bots) that perform cybersecurity attacks on the Internet, pose one of the most serious cybersecurity threats to many industries, including smart infrastructure [9, 10], Internet based companies, [11] and Internet of Things (IoT) [8]. There are many unconventional methods of organizing bots that are potentially advantageous to attackers. “Botnet”, as a technical term, cannot effectively describe these methods. With the vast amounts of Internet traffic data collected by security appliances, it is possible to reveal novel behavior of bots using data analysis algorithms. In this paper, we propose a concept called IP Gang to describe groups of bots from the perspective of the attacker’s business – we define IP Gangs to be groups of bots that often perform attacks together during a period of time. Crucially, we developed a fast, high-compatibility detection algorithm that can be deployed in wide-scale, industrial applications to effectively defend against IP Gangs. The detection algorithm is inspired by single-linkage clustering and optimized for large quantities of data. A test on a month (1.5 GB) of real life DDoS log data detected 21 IP Gangs, with 13916 bots in total. To analyze the behavior of the Gangs, we visualized the activity of each Gang with diagrams named “attack fingerprints” and confirmed that 15 of the detected Gangs displayed behavior that the concept of “botnet” alone cannot describe.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection. In: USENIX Security Symposium, vol. 5, no. 2, pp. 139–154 (2008)

    Google Scholar 

  2. Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutor. 16(2), 898–924 (2014)

    Article  Google Scholar 

  3. Vogt, R., Aycock, J., Jacobson, M.: Army of botnets. In: Proceedings of NDSS 2007 (2007)

    Google Scholar 

  4. Arbor Networks: DDoS as a smokescreen for fraud and theft, 3 February 2016. https://www.arbornetworks.com/blog/insight/ddos-as-a-smokescreen-for-fraud-and-theft/

  5. Kaspersky Lab: Research reveals hacker tactics: Cybercriminals use DDoS as smokescreen for other attacks on business, 22 November 2016. https://www.kaspersky.com/about/press-releases/2016_research-reveals-hacker-tactics-cybercriminals-use-ddos-as-smokescreen-for-other-attacks-on-business

  6. Stanford Natural Language Processing Group: Single-link and complete-link clustering (n.d.). https://nlp.stanford.edu/IR-book/html/htmledition/single-link-and-complete-link-clustering-1.html

  7. WeLiveSecurity: Spammed-out emails threaten websites with DDoS attack on September 30th, 25 September 2017. https://www.welivesecurity.com/2017/09/25/email-ddos-threat/

  8. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: mirai and other botnets. Computer 50(7), 80–84 (2017)

    Article  Google Scholar 

  9. Pultarova, T.: Cyber security - Ukraine grid hack is wake-up call for network operators. Eng. Technol. 11(1), 12–13 (2016)

    Article  Google Scholar 

  10. Khan, R., Maynard, P., McLaughlin, K., Laverty, D., Sezer, S.: Threat analysis of BlackEnergy malware for synchrophasor based real-time control and monitoring in smart grid. In: Janicke, H., Jones, K., Brandstetter, T. (eds.) 4th International Symposium for ICS & SCADA Cyber Security Research 2016, pp. 53–63 (2016)

    Google Scholar 

  11. Kaspersky Lab: Attack on Dyn explained. https://www.kaspersky.com/blog/attack-on-dyn-explained/13325/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tianyue Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, T., Qiu, X. (2018). Detection of IP Gangs: Strategically Organized Bots. In: Perner, P. (eds) Advances in Data Mining. Applications and Theoretical Aspects. ICDM 2018. Lecture Notes in Computer Science(), vol 10933. Springer, Cham. https://doi.org/10.1007/978-3-319-95786-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95786-9_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95785-2

  • Online ISBN: 978-3-319-95786-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics