BotCatch: leveraging signature and behavior for bot detection

被引:7
作者
Ji, Yuede [1 ,2 ]
Li, Qiang [1 ,2 ]
He, Yukun [1 ,2 ]
Guo, Dong [1 ,2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130023, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130023, Peoples R China
基金
中国国家自然科学基金;
关键词
botnet; bot detection; feedback; correlation;
D O I
10.1002/sec.1052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of bot detection is to discover malicious bot processes by signature comparison or behavior analysis. Existing approaches have several drawbacks, such as requiring a lot of prior knowledge, low detection accuracy, and high false alarm rate. In this paper, we propose a multi-feedback approach, BotCatch, to detect bots effectively and efficiently on a host by leverage of a combination of signature and behavior. First, BotCatch assigns suspicious files to signature-analysis and behavior-analysis modules, which generate each detection result. Second, BotCatch correlates signature and behavior results to generate the final detection result through correlation engine. Third, BotCatch feeds back signature, behavior, and correlation results to dynamically adjust detecting modules through multi-feedback engine. We evaluated the performance of BotCatch with 636 bot and 150 benign samples. Our results indicate that BotCatch achieves an accuracy of 97.1% and an F-measure value of 0.982 simultaneously, which is better than existing approaches without feedbacks. BotCatch, due to the multi-feedback mechanism, has the ability to gradually get more robust and accurate as the number of samples increases. The final stage even reaches an accuracy of 98.5% and F-measure value of 0.991. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:952 / 969
页数:18
相关论文
共 34 条
[1]  
A Johnson, 2013, P 2013 ACM SIGSAC C, P337
[2]  
Abdulla R.S., 2013, International Journal of Computer Science Issues (IJCSI), V10, P208
[3]  
[Anonymous], 2006, P 23 INT C MACHINE L, DOI DOI 10.1145/1143844.1143874
[4]  
[Anonymous], 2013, P 7 INT C EM SEC INF
[5]  
[Anonymous], P 17 ACM SIGKDD INT
[6]   Structural entropy and metamorphic malware [J].
Baysa, Donabelle ;
Low, Richard M. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (04) :179-192
[7]   On the Analysis of the Zeus Botnet Crimeware Toolkit [J].
Binsalleeh, H. ;
Ormerod, T. ;
Boukhtouta, A. ;
Sinha, P. ;
Youssef, A. ;
Debbabi, M. ;
Wang, L. .
PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, :31-38
[8]   Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization [J].
Biryukov, Alex ;
Pustogarov, Ivan ;
Weinmann, Ralf-Philipp .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :80-94
[9]   Design and analysis of a social botnet [J].
Boshmaf, Yazan ;
Muslukhov, Ildar ;
Beznosov, Konstantin ;
Ripeanu, Matei .
COMPUTER NETWORKS, 2013, 57 (02) :556-578
[10]  
Burghouwt P, 2011, LECT NOTES COMPUT SC, V7093, P131, DOI 10.1007/978-3-642-25560-1_9