Hybrid Botnet Detection Based on Host and Network Analysis

Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data steal...

Full description

Saved in:
Bibliographic Details
Main Authors: Suzan Almutairi, Saoucene Mahfoudh, Sultan Almutairi, Jalal S. Alowibdi
Format: Article
Language:English
Published: Wiley 2020-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2020/9024726
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832568680974647296
author Suzan Almutairi
Saoucene Mahfoudh
Sultan Almutairi
Jalal S. Alowibdi
author_facet Suzan Almutairi
Saoucene Mahfoudh
Sultan Almutairi
Jalal S. Alowibdi
author_sort Suzan Almutairi
collection DOAJ
description Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. The size of the botnet is usually very large, and millions of infected hosts may belong to it. In this paper, we addressed the problem of botnet detection based on network’s flows records and activities in the host. Thus, we propose a general technique capable of detecting new botnets in early phase. Our technique is implemented in both sides: host side and network side. The botnet communication traffic we are interested in includes HTTP, P2P, IRC, and DNS using IP fluxing. HANABot algorithm is proposed to preprocess and extract features to distinguish the botnet behavior from the legitimate behavior. We evaluate our solution using a collection of real datasets (malicious and legitimate). Our experiment shows a high level of accuracy and a low false positive rate. Furthermore, a comparison between some existing approaches was given, focusing on specific features and performance. The proposed technique outperforms some of the presented approaches in terms of accurately detecting botnet flow records within Netflow traces.
format Article
id doaj-art-f8fff346f0074210a904c5156997a42f
institution Kabale University
issn 2090-7141
2090-715X
language English
publishDate 2020-01-01
publisher Wiley
record_format Article
series Journal of Computer Networks and Communications
spelling doaj-art-f8fff346f0074210a904c5156997a42f2025-02-03T00:58:41ZengWileyJournal of Computer Networks and Communications2090-71412090-715X2020-01-01202010.1155/2020/90247269024726Hybrid Botnet Detection Based on Host and Network AnalysisSuzan Almutairi0Saoucene Mahfoudh1Sultan Almutairi2Jalal S. Alowibdi3Technical and Vocational Corporation, Riyadh, Saudi ArabiaEngineering, Computing and Informatics, Dar Al‐Hekma University, Jeddah, Saudi ArabiaTechnology Control Company, Riyadh, Saudi ArabiaFaculty of Computing and Information Technology, University of Jeddah, Jeddah, Saudi ArabiaBotnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. The size of the botnet is usually very large, and millions of infected hosts may belong to it. In this paper, we addressed the problem of botnet detection based on network’s flows records and activities in the host. Thus, we propose a general technique capable of detecting new botnets in early phase. Our technique is implemented in both sides: host side and network side. The botnet communication traffic we are interested in includes HTTP, P2P, IRC, and DNS using IP fluxing. HANABot algorithm is proposed to preprocess and extract features to distinguish the botnet behavior from the legitimate behavior. We evaluate our solution using a collection of real datasets (malicious and legitimate). Our experiment shows a high level of accuracy and a low false positive rate. Furthermore, a comparison between some existing approaches was given, focusing on specific features and performance. The proposed technique outperforms some of the presented approaches in terms of accurately detecting botnet flow records within Netflow traces.http://dx.doi.org/10.1155/2020/9024726
spellingShingle Suzan Almutairi
Saoucene Mahfoudh
Sultan Almutairi
Jalal S. Alowibdi
Hybrid Botnet Detection Based on Host and Network Analysis
Journal of Computer Networks and Communications
title Hybrid Botnet Detection Based on Host and Network Analysis
title_full Hybrid Botnet Detection Based on Host and Network Analysis
title_fullStr Hybrid Botnet Detection Based on Host and Network Analysis
title_full_unstemmed Hybrid Botnet Detection Based on Host and Network Analysis
title_short Hybrid Botnet Detection Based on Host and Network Analysis
title_sort hybrid botnet detection based on host and network analysis
url http://dx.doi.org/10.1155/2020/9024726
work_keys_str_mv AT suzanalmutairi hybridbotnetdetectionbasedonhostandnetworkanalysis
AT saoucenemahfoudh hybridbotnetdetectionbasedonhostandnetworkanalysis
AT sultanalmutairi hybridbotnetdetectionbasedonhostandnetworkanalysis
AT jalalsalowibdi hybridbotnetdetectionbasedonhostandnetworkanalysis