Skip to main content

Traffic Feature-Based Botnet Detection Scheme Emphasizing the Importance of Long Patterns

  • Conference paper
  • First Online:
Image Processing and Communications (IP&C 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1062))

Included in the following conference series:

Abstract

The botnet detection is imperative. Among several detection schemes, the promising one uses the communication sequences. The main idea of that scheme is that the communication sequences represent special feature since they are controlled by programs. That sequence is tokenized to truncated sequences by n-gram and the numbers of each pattern’s occurrence are used as a feature vector. However, although the features are normalized by the total number of all patterns’ occurrences, the number of occurrences in larger n are less than those of smaller n. That is, regardless of the value of n, the previous scheme normalizes it by the total number of all patterns’ occurrences. As a result, normalized long patterns’ features become very small value and are hidden by others. In order to overcome this shortcoming, in this paper, we propose a traffic feature-based botnet detection scheme emphasizing the importance of long patterns. We realize the emphasizing by two ideas. The first idea is normalizing occurrences by the total number of occurrences in each n instead of the total number of all patterns’ occurrences. By doing this, smaller occurrences in larger n are normalized by smaller values and the feature becomes more balanced with larger value. The second idea is giving weights to the normalized features by calculating ranks of the normalized feature. By weighting features according to the ranks, we can get more outstanding features of longer patterns. By the computer simulation with real dataset, we show the effectiveness of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saha, B., Gairola, A.: Botnet: an overview. In: CERT-In White Paper, CIWP-2005-05 (2005)

    Google Scholar 

  2. Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Botnet in DDoS attacks: trends and challenges. IEEE Commun. Surv. Tutor. 17(4), 2242–2270 (2015)

    Article  Google Scholar 

  3. Sahi, A., Lai, D., Li, Y., Diykh, M.: An efficient DDoS TCP flood attack detection and prevention system in a cloud environment, pp. 6036–6048 (2017)

    Google Scholar 

  4. Li, C., Jiang, W., Zou, X.: Botnet: survey and case study, pp. 1184–1187 (2009)

    Google Scholar 

  5. Goebel, J., Holz, T.: Rishi: identify bot contaminated hosts by IRC nickname evaluation. HotBots 7, 8 (2007)

    Google Scholar 

  6. Kapre, A., Padmavathi, B.: Behaviour based botnet detection with traffic analysis and flow interavals using PSO and SVM. In: ICICCS, pp. 718–722 (2017)

    Google Scholar 

  7. Livadas, C., Walsh, R., Lapsley, D., Strayer, W.T.: Using machine learning techniques to identify botnet traffic. In: IEEE 2006 Proceedings of the 31st IEEE Conference, pp. 967–974 (2006)

    Google Scholar 

  8. Vapnik, V.: Pattern recognition using generalized portrait method. Autom. Remote Control 24, 774–780 (1963)

    Google Scholar 

  9. Lee, Y.C., Tseng, C.M., Liu, T.J.: A HTTP botnet detection system based on ranking mechanism. In: 2017 Twelfth International Conference, pp. 115–120. IEEE (2017)

    Google Scholar 

  10. Su, Y.H., Rezapour, A., Tzeng, W.G.: The forward-backward string: a new robust feature for botnet detection. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 485–492 (2017)

    Google Scholar 

  11. Dietrich, C.J., Rossow, C., Freiling, F.C., Bos, H., Van Steen, M., Pohlmann, N.: On botnets that use DNS for command and control. In: Seventh European Conference on Computer Network Defense, pp. 9–16 (2011)

    Google Scholar 

  12. Leskovec, J., Mcauley, J.J.: Towards effective feature selection in machine learning-based botnet detection approaches. In: Communications and Network Security (CNS). IEEE (2014)

    Google Scholar 

  13. ISCX botnet dataset university of new Brunswick. http://www.unb.ca/cic/research/datasets/botnet.html

  14. Saad, S., Traore, I., Ghorbani, A., Sayed, B., Zhao, D., Lu, W., Felix, J., Hakimian, P.: Detecting P2P botnets through network behavior analysis and machine learning. In: Proceedings of 9th Annual Conference on Privacy, pp. 174–180. IEEE (2011)

    Google Scholar 

Download references

Acknowledgment

This work is partly supported by the Grant in Aid for Scientific Research (No. 17K06440) from Japan Society for Promotion of Science (JSPS).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iwao Sasase .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

An, Y., Haruta, S., Choi, S., Sasase, I. (2020). Traffic Feature-Based Botnet Detection Scheme Emphasizing the Importance of Long Patterns. In: Choraś, M., Choraś, R. (eds) Image Processing and Communications. IP&C 2019. Advances in Intelligent Systems and Computing, vol 1062. Springer, Cham. https://doi.org/10.1007/978-3-030-31254-1_22

Download citation

Publish with us

Policies and ethics