SlideShare a Scribd company logo
Detecting P2P Botnets through Network
Behavior Analysis and Machine Learning
Sherif Saad, Issa Traore et al.
2011 PST
(Ninth Annual International Conference on Privacy, Security and Trust)
Outline
• Introduction
• Related Work
• Network Behavior Analysis
• Experiment and Evaluation
• Conclusion
Introduction
• IRC and HTTP-based botnets are vulnerable because they are based
on highly centralized architectures.
• Currently the new trend in botnet communication is toward Peer-to-
Peer architectures.
• Bot master can inject commands in to any part of the P2P botnet.
Centralized architecture
Decentralized architecture
Botnet Lifecycle
• Leonard et al divided the botnet lifecycle into three phases, namely,
Formation, C&C communication, and attack phases.
• Most of recent research detects botnet during the formation or the
attack phase.
• This paper focus on detecting bots during the C&C phase.
Formation Phase
Injection,
unwanted
download
binary.
Web
browsing,
etc.
Compromised
Binary server
C&C Communication Phase
Propagate instructions
Periodical connection,
Update status.
Compromised
C&C server
Attack Phase
DDoS attack, spread
spam, or steal personal
user information.
Compromised computers
Victim
Related Work
• Several studies have shown that network traffic identification can
effectively distinguish between different classes of network
applications.
• Recently, many of the literature in this field focuses on analyzing P2P
botnet.
Using Network Behaviors Analysis To Detect
Botnet
• It’s possible to detect bots during any phase of their lifecycle.
• It’s less expensive compared to other approaches like implement
deep-payload-analysis or attempt to capture and study live bots using
honeynets.
Detecting Bots During C&C Phase
• Allows detecting bots that were missed during the formation phase
and before they launch their attack and cause some damages.
Network Behavior Analysis
• In general, there are three categories of network traffic identification
methods:
• Port-based analysis
• Protocol-based analysis
• Behavior-based analysis
• Network traffic information can usually be easily retrieved from
various network devices without affecting significantly network
performance or service availability.
Network Behavior Analysis
• Each of the existing major botnet (for instance Storm and Zeus.)
implements their own specific C&C architecture.
• Such architectures tend to exhibit distinguishing behaviors that can
be captured by analyzing network traffic characteristics.
• Identifying specific traffic characteristics can be used to distinguish
between botnets traffic and other network application traffic.
Traffic Characteristics
• Payload size
• Number of packets
• Duplicated packets length
• Concurrent active ports
Features Selection
• Flow-based features
• Used to link flows to specific class of network traffic such as P2P traffic or
non-P2P traffic.
• Host-based features
• Occur in the communications between hosts.
• Identify host with shared communications patterns.
• 17 features extracted.
Flow-Based Features
• Source IP, Source Port, Destination IP, Destination Port, Protocol.
• Packet Length, Average Packet Length, Length of First Packet.
• Total Number of Packets per Flow.
• Total Number of Bytes per Flow.
• Incoming Packets over Outgoing Packets.
• Packets of Same Length over Total Number of Packets in Same Flow.
• Total Bytes of All Packets over Total Number of Packets in Same Flow.
Host-Based Features
• Ratio of Number of Source Ports to The Number of Destination Ports.
• The Number of Connections over The Number of Destination IP.
• The Sum of Different Transmission Protocols used per Destination IP
over The Total Number of Destination IPs.
• The Number of Destination IPs Connected to The Same Open Port in
The Monitored Host over The Total Number of Open Ports in The
Monitored Host.
Experiment
• Datasets
• Malware traffic
• French chapter of the honeynet project, involving the Storm and the Walowdac botnet.
• Such traffic doesn’t generate regular benign traffic that typically would occur in a real
world scenario.
• Non-malicious traffic
• Labeled dataset from the Traffic Lab at Ericsson Research in Hungary.
• User-generated normal traffic
• The traffic in the dataset should be intermixed as if both kinds of
traffic were happening at same time from the same machines.
Malware Network Traffic
• The trace file corresponds to the C&C and attack phase of the storm
and Walowdac botnet as the bot master used this machine to spread
spam.
Malware Network Traffic
Non-Malicious Traffic
• Contains over a million packets of general traffic that ranges from web
browsing to P2P traffic and gaming such as World of Warcraft.
• Every packet was labeled with the originating or the target process
running on the test machines.
Non-Malicious Traffic
Datasets Merging
• Mapped the IP addresses of the infected machines to two of the
machines in benign dataset.
• Replayed all of the trace files using TcpReplay tool on the same
network interface card.
• Use capturing tool, such as wireshark, to listen on network interface
and capture the output to a file.
Datasets Merging
Evaluation
• Parse the network traffic dataset and extracts 129,453 feature vectors,
which are labeled into three classes, namely, Botnet C&C, non-P2P
traffic, and normal P2P traffic.
• Use 10-fold cross-validation and machine learning tools, like Weka to
evaluate their approach.
Evaluation
Evaluation
Conclusion
• They design a model using network traffic characteristic to detect P2P
botnet (Storm and Walowdac).
• They experiment 5 popular MLA to classify malicious traffic.

More Related Content

What's hot

Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
Yoram Orzach
 
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP AnalysisNetwork analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Yoram Orzach
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
Yoram Orzach
 
Wireshark
WiresharkWireshark
Wireshark
WiresharkWireshark
Wireshark
Kasun Madusanke
 
Wireshark
Wireshark Wireshark
Wireshark
antivirusspam
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
Coursenvy.com
 
pathtrace
pathtracepathtrace
pathtrace
Long Tran
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol Analyzer
Jim Gilsinn
 
Network analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture FiltersNetwork analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture Filters
Yoram Orzach
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
Anpumathews
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
n|u - The Open Security Community
 
lesson 7- Network analysis Using Wireshark - advanced statistics tools
lesson 7- Network analysis Using Wireshark - advanced statistics toolslesson 7- Network analysis Using Wireshark - advanced statistics tools
lesson 7- Network analysis Using Wireshark - advanced statistics tools
Yoram Orzach
 
Xml tyoelamassa eng
Xml tyoelamassa engXml tyoelamassa eng
Xml tyoelamassa eng
JoniKettunen
 
Wireshark lab getting started one’s unde
Wireshark lab  getting started     one’s undeWireshark lab  getting started     one’s unde
Wireshark lab getting started one’s unde
piya30
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
Chaman Poorani
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
mhaviv
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
Jim Gilsinn
 
Wireshark network analysing software
Wireshark network analysing softwareWireshark network analysing software
Wireshark network analysing software
dharmesh nakum
 

What's hot (19)

Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP AnalysisNetwork analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
Wireshark Wireshark
Wireshark
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
pathtrace
pathtracepathtrace
pathtrace
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol Analyzer
 
Network analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture FiltersNetwork analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture Filters
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
lesson 7- Network analysis Using Wireshark - advanced statistics tools
lesson 7- Network analysis Using Wireshark - advanced statistics toolslesson 7- Network analysis Using Wireshark - advanced statistics tools
lesson 7- Network analysis Using Wireshark - advanced statistics tools
 
Xml tyoelamassa eng
Xml tyoelamassa engXml tyoelamassa eng
Xml tyoelamassa eng
 
Wireshark lab getting started one’s unde
Wireshark lab  getting started     one’s undeWireshark lab  getting started     one’s unde
Wireshark lab getting started one’s unde
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Wireshark network analysing software
Wireshark network analysing softwareWireshark network analysing software
Wireshark network analysing software
 

Viewers also liked

Nonparametric Density Estimation
Nonparametric Density EstimationNonparametric Density Estimation
Nonparametric Density Estimation
jachno
 
Network Based Kernel Density Estimation for Cycling Facilities Optimal Locati...
Network Based Kernel Density Estimation for Cycling Facilities Optimal Locati...Network Based Kernel Density Estimation for Cycling Facilities Optimal Locati...
Network Based Kernel Density Estimation for Cycling Facilities Optimal Locati...
Beniamino Murgante
 
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Pratik Narang
 
WSDM'16 Relational Learning with Social Status Analysis
WSDM'16 Relational Learning with Social Status AnalysisWSDM'16 Relational Learning with Social Status Analysis
WSDM'16 Relational Learning with Social Status Analysis
Arizona State University
 
Chaubey seminarslides2017
Chaubey seminarslides2017Chaubey seminarslides2017
Chaubey seminarslides2017
ychaubey
 
Slides smart-2015
Slides smart-2015Slides smart-2015
Slides smart-2015
Arthur Charpentier
 
Lundi 16h15-copules-charpentier
Lundi 16h15-copules-charpentierLundi 16h15-copules-charpentier
Lundi 16h15-copules-charpentier
Arthur Charpentier
 

Viewers also liked (7)

Nonparametric Density Estimation
Nonparametric Density EstimationNonparametric Density Estimation
Nonparametric Density Estimation
 
Network Based Kernel Density Estimation for Cycling Facilities Optimal Locati...
Network Based Kernel Density Estimation for Cycling Facilities Optimal Locati...Network Based Kernel Density Estimation for Cycling Facilities Optimal Locati...
Network Based Kernel Density Estimation for Cycling Facilities Optimal Locati...
 
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
 
WSDM'16 Relational Learning with Social Status Analysis
WSDM'16 Relational Learning with Social Status AnalysisWSDM'16 Relational Learning with Social Status Analysis
WSDM'16 Relational Learning with Social Status Analysis
 
Chaubey seminarslides2017
Chaubey seminarslides2017Chaubey seminarslides2017
Chaubey seminarslides2017
 
Slides smart-2015
Slides smart-2015Slides smart-2015
Slides smart-2015
 
Lundi 16h15-copules-charpentier
Lundi 16h15-copules-charpentierLundi 16h15-copules-charpentier
Lundi 16h15-copules-charpentier
 

Similar to 2014.7.9 detecting p2 p botnets through network behavior analysis and machine learning

Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
SafiUllah Saikat
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
KAMALI PRIYA P
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
FellowBuddy.com
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
talkaton
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
talkaton
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
Farjad Noor
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
Rishu Seth
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Computer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdfComputer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdf
ShanthalaKV
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
Issar Kapadia
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
Shaurya Gogia
 
P2P networking.pptx
P2P networking.pptxP2P networking.pptx
P2P networking.pptx
WasiqMehraj2
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
Abhishek Kesharwani
 
Towards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationTowards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classification
IJERA Editor
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
shanthishyam
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
APNIC
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
Manikandan Kandasamy
 

Similar to 2014.7.9 detecting p2 p botnets through network behavior analysis and machine learning (20)

Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Computer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdfComputer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdf
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
 
P2P networking.pptx
P2P networking.pptxP2P networking.pptx
P2P networking.pptx
 
Network security
 Network security Network security
Network security
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 
Towards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationTowards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classification
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 

Recently uploaded

14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
What’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 UpdateWhat’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 Update
VictoriaMetrics
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
widenerjobeyrl638
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Vince Scalabrino
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
kalichargn70th171
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
Anand Bagmar
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
Yara Milbes
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
Reetu63
 
The Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdfThe Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdf
mohitd6
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
alowpalsadig
 
Refactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contextsRefactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contexts
Michał Kurzeja
 
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical OperationsEnsuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
OnePlan Solutions
 
Orca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container OrchestrationOrca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container Orchestration
Pedro J. Molina
 
Beginner's Guide to Observability@Devoxx PL 2024
Beginner's  Guide to Observability@Devoxx PL 2024Beginner's  Guide to Observability@Devoxx PL 2024
Beginner's Guide to Observability@Devoxx PL 2024
michniczscribd
 
Hands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion StepsHands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion Steps
servicesNitor
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 

Recently uploaded (20)

14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
What’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 UpdateWhat’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 Update
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
 
bgiolcb
bgiolcbbgiolcb
bgiolcb
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
 
The Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdfThe Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdf
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
 
Refactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contextsRefactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contexts
 
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical OperationsEnsuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
 
Orca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container OrchestrationOrca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container Orchestration
 
Beginner's Guide to Observability@Devoxx PL 2024
Beginner's  Guide to Observability@Devoxx PL 2024Beginner's  Guide to Observability@Devoxx PL 2024
Beginner's Guide to Observability@Devoxx PL 2024
 
Hands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion StepsHands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion Steps
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 

2014.7.9 detecting p2 p botnets through network behavior analysis and machine learning

  • 1. Detecting P2P Botnets through Network Behavior Analysis and Machine Learning Sherif Saad, Issa Traore et al. 2011 PST (Ninth Annual International Conference on Privacy, Security and Trust)
  • 2. Outline • Introduction • Related Work • Network Behavior Analysis • Experiment and Evaluation • Conclusion
  • 3. Introduction • IRC and HTTP-based botnets are vulnerable because they are based on highly centralized architectures. • Currently the new trend in botnet communication is toward Peer-to- Peer architectures. • Bot master can inject commands in to any part of the P2P botnet.
  • 6. Botnet Lifecycle • Leonard et al divided the botnet lifecycle into three phases, namely, Formation, C&C communication, and attack phases. • Most of recent research detects botnet during the formation or the attack phase. • This paper focus on detecting bots during the C&C phase.
  • 8. C&C Communication Phase Propagate instructions Periodical connection, Update status. Compromised C&C server
  • 9. Attack Phase DDoS attack, spread spam, or steal personal user information. Compromised computers Victim
  • 10. Related Work • Several studies have shown that network traffic identification can effectively distinguish between different classes of network applications. • Recently, many of the literature in this field focuses on analyzing P2P botnet.
  • 11. Using Network Behaviors Analysis To Detect Botnet • It’s possible to detect bots during any phase of their lifecycle. • It’s less expensive compared to other approaches like implement deep-payload-analysis or attempt to capture and study live bots using honeynets.
  • 12. Detecting Bots During C&C Phase • Allows detecting bots that were missed during the formation phase and before they launch their attack and cause some damages.
  • 13. Network Behavior Analysis • In general, there are three categories of network traffic identification methods: • Port-based analysis • Protocol-based analysis • Behavior-based analysis • Network traffic information can usually be easily retrieved from various network devices without affecting significantly network performance or service availability.
  • 14. Network Behavior Analysis • Each of the existing major botnet (for instance Storm and Zeus.) implements their own specific C&C architecture. • Such architectures tend to exhibit distinguishing behaviors that can be captured by analyzing network traffic characteristics. • Identifying specific traffic characteristics can be used to distinguish between botnets traffic and other network application traffic.
  • 15. Traffic Characteristics • Payload size • Number of packets • Duplicated packets length • Concurrent active ports
  • 16. Features Selection • Flow-based features • Used to link flows to specific class of network traffic such as P2P traffic or non-P2P traffic. • Host-based features • Occur in the communications between hosts. • Identify host with shared communications patterns. • 17 features extracted.
  • 17. Flow-Based Features • Source IP, Source Port, Destination IP, Destination Port, Protocol. • Packet Length, Average Packet Length, Length of First Packet. • Total Number of Packets per Flow. • Total Number of Bytes per Flow. • Incoming Packets over Outgoing Packets. • Packets of Same Length over Total Number of Packets in Same Flow. • Total Bytes of All Packets over Total Number of Packets in Same Flow.
  • 18. Host-Based Features • Ratio of Number of Source Ports to The Number of Destination Ports. • The Number of Connections over The Number of Destination IP. • The Sum of Different Transmission Protocols used per Destination IP over The Total Number of Destination IPs. • The Number of Destination IPs Connected to The Same Open Port in The Monitored Host over The Total Number of Open Ports in The Monitored Host.
  • 19. Experiment • Datasets • Malware traffic • French chapter of the honeynet project, involving the Storm and the Walowdac botnet. • Such traffic doesn’t generate regular benign traffic that typically would occur in a real world scenario. • Non-malicious traffic • Labeled dataset from the Traffic Lab at Ericsson Research in Hungary. • User-generated normal traffic • The traffic in the dataset should be intermixed as if both kinds of traffic were happening at same time from the same machines.
  • 20. Malware Network Traffic • The trace file corresponds to the C&C and attack phase of the storm and Walowdac botnet as the bot master used this machine to spread spam.
  • 22. Non-Malicious Traffic • Contains over a million packets of general traffic that ranges from web browsing to P2P traffic and gaming such as World of Warcraft. • Every packet was labeled with the originating or the target process running on the test machines.
  • 24. Datasets Merging • Mapped the IP addresses of the infected machines to two of the machines in benign dataset. • Replayed all of the trace files using TcpReplay tool on the same network interface card. • Use capturing tool, such as wireshark, to listen on network interface and capture the output to a file.
  • 26. Evaluation • Parse the network traffic dataset and extracts 129,453 feature vectors, which are labeled into three classes, namely, Botnet C&C, non-P2P traffic, and normal P2P traffic. • Use 10-fold cross-validation and machine learning tools, like Weka to evaluate their approach.
  • 29. Conclusion • They design a model using network traffic characteristic to detect P2P botnet (Storm and Walowdac). • They experiment 5 popular MLA to classify malicious traffic.

Editor's Notes

  1. One can disrupt the entire botnet by simply shutting sown the IRC or HTTP server 針對P2P殭屍網路的連線行為特性我們提出三個假設:第一是P2P殭屍網路的通訊會模仿P2P 軟體的架構大量建立連線和其他bot進行通訊以達到multiple controller和mesh network架構的目的,也就是說該殭屍電腦連線數瞬間有效連結數會極多。第二是P2P殭屍網路為了保持這個網路,會和其他的botnet成員保持連線與交換資料,而非完成傳輸之後就不相通訊,也就是每條連線都會有一定的傳輸量。第三是殭屍電腦為了保持隱密不讓受害者發現,bot通訊會盡量用最少的資料量做傳輸這代表著連線雖多,但每條連線應該都是小流量。
  2. One can disrupt the entire botnet by simply shutting sown the IRC or HTTP server
  3. One can disrupt the entire botnet by simply shutting sown the IRC or HTTP server
  4. One can disrupt the entire botnet by simply shutting sown the IRC or HTTP server
  5. One can disrupt the entire botnet by simply shutting sown the IRC or HTTP server
  6. One can disrupt the entire botnet by simply shutting sown the IRC or HTTP server
  7. One can disrupt the entire botnet by simply shutting sown the IRC or HTTP server
  8. 針對P2P殭屍網路的連線行為特性我們提出三個假設:第一是P2P殭屍網路的通訊會模仿P2P 軟體的架構大量建立連線和其他bot進行通訊以達到multiple controller和mesh network架構的目的,也就是說該殭屍電腦連線數瞬間有效連結數會極多。第二是P2P殭屍網路為了保持這個網路,會和其他的botnet成員保持連線與交換資料,而非完成傳輸之後就不相通訊,也就是每條連線都會有一定的傳輸量。第三是殭屍電腦為了保持隱密不讓受害者發現,bot通訊會盡量用最少的資料量做傳輸這代表著連線雖多,但每條連線應該都是小流量。
  9. One can disrupt the entire botnet by simply shutting sown the IRC or HTTP server
  10. 1.High false identification rates, there are thousands of network applications that do not use registered ports. 2.This method based on packets payload analysis, that has minimum false identification rate , but, computationally intensive, and some privacy problem, and encrypt problem. 3.Do not depend on the packets payload, which means that they can work with encrypted traffic.
  11. Src port 跟 dest port 的比值 每個dest IP 有多少connection 平均每個dest IP 有多少transmission Protocol 這台host平均每個open port有多少dest IP 連線
  12. 針對P2P殭屍網路的連線行為特性我們提出三個假設:第一是P2P殭屍網路的通訊會模仿P2P 軟體的架構大量建立連線和其他bot進行通訊以達到multiple controller和mesh network架構的目的,也就是說該殭屍電腦連線數瞬間有效連結數會極多。第二是P2P殭屍網路為了保持這個網路,會和其他的botnet成員保持連線與交換資料,而非完成傳輸之後就不相通訊,也就是每條連線都會有一定的傳輸量。第三是殭屍電腦為了保持隱密不讓受害者發現,bot通訊會盡量用最少的資料量做傳輸這代表著連線雖多,但每條連線應該都是小流量。
  13. 針對P2P殭屍網路的連線行為特性我們提出三個假設:第一是P2P殭屍網路的通訊會模仿P2P 軟體的架構大量建立連線和其他bot進行通訊以達到multiple controller和mesh network架構的目的,也就是說該殭屍電腦連線數瞬間有效連結數會極多。第二是P2P殭屍網路為了保持這個網路,會和其他的botnet成員保持連線與交換資料,而非完成傳輸之後就不相通訊,也就是每條連線都會有一定的傳輸量。第三是殭屍電腦為了保持隱密不讓受害者發現,bot通訊會盡量用最少的資料量做傳輸這代表著連線雖多,但每條連線應該都是小流量。